<?xml version='1.0' encoding='UTF-8' ?>
<rss version='2.0'>
<channel>
<title>Ransom Feed | RSS Complete</title>
<link>https://ransomfeed.it/</link>
<description>Ransomware victims RSS <img referrerpolicy="no-referrer-when-downgrade" src="https://matomo.ransomfeed.it/matomo.php?idsite=1&amp;rec=1" style="border:0" alt="" /></description>
<language>en-us</language>
<item xmlns:dc='ns:1'>
<title>Jgb</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31806</link>
<guid>d89920adb1af2d681ea0df8a9f863a82</guid>
<id>31806</id>
<pubDate>Thu, 30 Apr 2026 07:55:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Jgb</b>. The target comes from <b>Colombia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>905f9ac08e27f3ac4cdc9974ec8575ddd7082157e266ebf02024d7732c2a97d7</i> (ID: 31806)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morae</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31805</link>
<guid>a4cfa38878b278bbe2f6f5172474f86b</guid>
<id>31805</id>
<pubDate>Thu, 30 Apr 2026 02:51:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Morae</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>767e1a1eaaf503d85590a3a1f3b049d980aafa9287a93b8cb2f8aaa9360e9311</i> (ID: 31805)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arban &amp; Carosi</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31804</link>
<guid>70e57e78fd611128e6e6212c59c28b59</guid>
<id>31804</id>
<pubDate>Thu, 30 Apr 2026 01:23:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Arban &amp; Carosi</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0800798b74f1daebb348c4ffb75b00f5bfbb1923f689b1bf55e3ea9ec601b198</i> (ID: 31804)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Caunton Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31803</link>
<guid>922a7fd3b1c537453af87329140dcfb2</guid>
<id>31803</id>
<pubDate>Thu, 30 Apr 2026 00:58:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Caunton Engineering</b>. The target comes from <b>UK</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33ae07df42348a908e959d94b1f8bd5fece05853b60d154eba022147b408ef3c</i> (ID: 31803)<br /><br />Target victim <b>website</b>: <i>caunton.co.uk</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>V. FRAAS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31802</link>
<guid>a306a13c6c1ee387390fdc96c7bdca66</guid>
<id>31802</id>
<pubDate>Thu, 30 Apr 2026 00:58:12 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>V. FRAAS</b>. The target comes from <b>Germany</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b11018a07e829132c27965dea370a6213dfac10fe3ef604aec8b9ea89a8e9c3c</i> (ID: 31802)<br /><br />Target victim <b>website</b>: <i>vfraas.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bespoke Home Interior Design Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31801</link>
<guid>7dcf8773e0db912ac8a9bd8914aed99e</guid>
<id>31801</id>
<pubDate>Thu, 30 Apr 2026 00:57:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Bespoke Home Interior Design Group</b>. The target comes from <b>UK</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d806b8feb1dd8abfc6d452e26a7aa5bfbc56748310ddb720608d779cbb80bc42</i> (ID: 31801)<br /><br />Target victim <b>website</b>: <i>bhid.co.uk</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vortex Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31800</link>
<guid>907426606e10139de6617963c3e73cff</guid>
<id>31800</id>
<pubDate>Thu, 30 Apr 2026 00:57:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Vortex Companies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>059da878137e6ff54d6fe8f0fc1335e15aaa1a749aae287f990c05c3299e9482</i> (ID: 31800)<br /><br />Target victim <b>website</b>: <i>vortexcompanies.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Telia Norge AS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31799</link>
<guid>7e1778994e19321c01d18786dc19e1f2</guid>
<id>31799</id>
<pubDate>Thu, 30 Apr 2026 00:56:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Telia Norge AS</b>. The target comes from <b>Norway</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>615cf0e89da1ca3ccfcf20c1279f805ce5c07ea977c2c230d52ae54f46cc4704</i> (ID: 31799)<br /><br />Target victim <b>website</b>: <i>telia.no</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prater Engineering Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31798</link>
<guid>c035b218ddd4d6de439e5391d49cec73</guid>
<id>31798</id>
<pubDate>Thu, 30 Apr 2026 00:56:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Prater Engineering Associates</b>. The target comes from <b>Ireland</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85391a1029bcf18a07555d98d47ee499d0c1ee05af0e3d9369003b238b156422</i> (ID: 31798)<br /><br />Target victim <b>website</b>: <i>praterengineering.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>ESENTIA Energy Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31797</link>
<guid>f8ad8eaac9500143d39e20cb356df793</guid>
<id>31797</id>
<pubDate>Thu, 30 Apr 2026 00:55:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>ESENTIA Energy Systems</b>. The target comes from <b>Mexico</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18b88c3cfed35b55ebfc95f01e4448f203498ae83a4d05a45e43b7d51697f69a</i> (ID: 31797)<br /><br />Target victim <b>website</b>: <i>esentiaenergy.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Del Monte Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31796</link>
<guid>45e7200bd1dbaf868c1b69de0dec23b9</guid>
<id>31796</id>
<pubDate>Thu, 30 Apr 2026 00:55:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Del Monte Foods</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e90848fd2a8825a1b443d33a18b2f56701a37712e36174282c727fbd721b1916</i> (ID: 31796)<br /><br />Target victim <b>website</b>: <i>delmontefoods.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>I****G</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31795</link>
<guid>de785fbd9c75be03fbd0dcc93a638fae</guid>
<id>31795</id>
<pubDate>Thu, 30 Apr 2026 00:55:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>I****G</b>. The target comes from <b>Non Disponibile</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38f65975dda16ba7f0867879b67bf553a928c91fbf38dbd8a8afe36b98ac4d91</i> (ID: 31795)<br /><br />Target victim <b>website</b>: <i>im****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>O****C</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31794</link>
<guid>b9959873b3c9618749826c0f39ed7364</guid>
<id>31794</id>
<pubDate>Thu, 30 Apr 2026 00:55:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>O****C</b>. The target comes from <b>Non Disponibile</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d962d7562ed049eb14bd69a7d39d055cf9a04914ee51cf7e5f4a3f50ae118bf</i> (ID: 31794)<br /><br />Target victim <b>website</b>: <i>o****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>UFP Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31793</link>
<guid>738d7deb467d69ea5d6c8aacb9613245</guid>
<id>31793</id>
<pubDate>Thu, 30 Apr 2026 00:55:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>UFP Technologies</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f8a7438d97261c9684a760724ced0f8c1716c3623a4558e81074b345bb337c3</i> (ID: 31793)<br /><br />Target victim <b>website</b>: <i>ufpt.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>G****s</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31792</link>
<guid>c2ea9ab296477ed6346856f41c9aa5da</guid>
<id>31792</id>
<pubDate>Thu, 30 Apr 2026 00:55:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>G****s</b>. The target comes from <b>Non Disponibile</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ae08618f58e8f39d1c61acf9cdb4557b9ba9846c4abdb72c4a997b1032bfb63</i> (ID: 31792)<br /><br />Target victim <b>website</b>: <i>g****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>E****b</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31791</link>
<guid>5707abfe502cadf6688e68ddbae96060</guid>
<id>31791</id>
<pubDate>Thu, 30 Apr 2026 00:54:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>E****b</b>. The target comes from <b>Non Disponibile</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39f34ea89619e2f2d4480ddb2bf4d1c2e3e0e7648ef7650d81dc87c306e4dbfe</i> (ID: 31791)<br /><br />Target victim <b>website</b>: <i>e****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aero-Coating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31790</link>
<guid>3b11e049d4d051954f4c8b742a2b306e</guid>
<id>31790</id>
<pubDate>Thu, 30 Apr 2026 00:54:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Aero-Coating</b>. The target comes from <b>Germany</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca55144bee5baee0804afd7bdeb6f5b0fecd71d2c3c07ad7bfe3161b04e5b9af</i> (ID: 31790)<br /><br />Target victim <b>website</b>: <i>aero-coating.de</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peachtree Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31789</link>
<guid>0493033a1c9575336529c17abf994b52</guid>
<id>31789</id>
<pubDate>Thu, 30 Apr 2026 00:54:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Peachtree Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed7077f735d647390d7329bcf355e9fe2c022aa9c4bc5612553fbbbe6bc26491</i> (ID: 31789)<br /><br />Target victim <b>website</b>: <i>peachtreegroup.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ash &amp; Lacy Holdings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31788</link>
<guid>ba085ba9ace538a0e831ccfffb1265e6</guid>
<id>31788</id>
<pubDate>Thu, 30 Apr 2026 00:53:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Ash &amp; Lacy Holdings</b>. The target comes from <b>UK</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2fac6ac8b06d3284bf4d572342242c4a04c325e84edfb6bd46f9de8cd3b60f84</i> (ID: 31788)<br /><br />Target victim <b>website</b>: <i>ashandlacy.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maderas del Alto Urgel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31787</link>
<guid>ccfca21346c3478e872460bfaa0ba337</guid>
<id>31787</id>
<pubDate>Thu, 30 Apr 2026 00:53:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Maderas del Alto Urgel</b>. The target comes from <b>Spain</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>606279c4316b6726db1ba5c56c6f897e380aafa3321bcc448cc83f259eb48c5e</i> (ID: 31787)<br /><br />Target victim <b>website</b>: <i>mausa.es</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eyemart Express</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31786</link>
<guid>499cb2ee42a8be29ad10e4afa28e0af8</guid>
<id>31786</id>
<pubDate>Thu, 30 Apr 2026 00:42:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Eyemart Express</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1e18a29cfd1e6d7851f18fc5b1bfba4491b3bfd84c435bc4cee8308ff706679</i> (ID: 31786)<br /><br />Target victim <b>website</b>: <i>eyemartexpress.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sofinter S.p.a</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31785</link>
<guid>8aff4d955cd8461e94156de3c712b712</guid>
<id>31785</id>
<pubDate>Thu, 30 Apr 2026 00:41:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Sofinter S.p.a</b>. The target comes from <b>Italy</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bfdbb37aad5b9027fdb40b7a522abd566e539d65dc18be380f546b52b5cce3c5</i> (ID: 31785)<br /><br />Target victim <b>website</b>: <i>sofinter.it</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grant Production Testing Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31784</link>
<guid>f35f71b69154572b602a36ded3d5e04b</guid>
<id>31784</id>
<pubDate>Thu, 30 Apr 2026 00:40:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Grant Production Testing Services</b>. The target comes from <b>Canada</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd7ffc9fdce10b9cb61d458efec8066a59c5ab73258f4fb34837d895acab4f59</i> (ID: 31784)<br /><br />Target victim <b>website</b>: <i>grantpts.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kichler Lighting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31783</link>
<guid>79d60d2defe0e8a228ed1fd7fab86e23</guid>
<id>31783</id>
<pubDate>Thu, 30 Apr 2026 00:39:09 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Kichler Lighting</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfb68bb9e8dbd65c5c81ee747c6d3e712e41de8bb95d74232d03b3499884e23a</i> (ID: 31783)<br /><br />Target victim <b>website</b>: <i>kichler.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Powell Electronics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31782</link>
<guid>660bc121513a9d5442e97c5cef85786e</guid>
<id>31782</id>
<pubDate>Thu, 30 Apr 2026 00:38:03 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Powell Electronics</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ef18b24363127230ce2646e9f499e9523ffe859e53acb266e8fa75ca5279a6d</i> (ID: 31782)<br /><br />Target victim <b>website</b>: <i>powell.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Central National Gottesman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31781</link>
<guid>7d6ff84af104d3d7a8e3b9f86dc7a030</guid>
<id>31781</id>
<pubDate>Thu, 30 Apr 2026 00:36:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Central National Gottesman</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68abf3b02a7be66d8344a762e81710f26789cc7bdb61a4d0b6c2ba3559d69fdf</i> (ID: 31781)<br /><br />Target victim <b>website</b>: <i>cng-inc.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Florida East Coast Railway</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31780</link>
<guid>0801dafc88d3117e0db830a42ddf944c</guid>
<id>31780</id>
<pubDate>Thu, 30 Apr 2026 00:35:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Florida East Coast Railway</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f21a20bc7bc93ddb88d53eaa589f65f4082d7436d6a71c3918f6a489962f241e</i> (ID: 31780)<br /><br />Target victim <b>website</b>: <i>fecrwy.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blanchard</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31779</link>
<guid>a39878ae282a18ea051ad89e7875a272</guid>
<id>31779</id>
<pubDate>Thu, 30 Apr 2026 00:34:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Blanchard</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86f28fc1f8907084cc0e54639d90250993cd0e136f60eac976d62aa1052f1f49</i> (ID: 31779)<br /><br />Target victim <b>website</b>: <i>blanchard.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grace Design Studios</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31778</link>
<guid>7f1b9e870ce469ea8f20e0a89bbc9ef8</guid>
<id>31778</id>
<pubDate>Thu, 30 Apr 2026 00:33:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Grace Design Studios</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>185dee0ff0e77e17921e558a68fa9c50645251f069b42bc8961041b25fdb5837</i> (ID: 31778)<br /><br />Target victim <b>website</b>: <i>grace-design.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>TESSCO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31777</link>
<guid>9a5a511ca4f18a61719b12acf46f14c0</guid>
<id>31777</id>
<pubDate>Thu, 30 Apr 2026 00:32:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>TESSCO</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7481a6c3ab00154d9a1a920aa158dbac627075e7a27a27cbef03581d882f423b</i> (ID: 31777)<br /><br />Target victim <b>website</b>: <i>tessco.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Englewood Lab</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31776</link>
<guid>1c0708af4331df1a35dfbdaf8e252d6e</guid>
<id>31776</id>
<pubDate>Thu, 30 Apr 2026 00:31:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Englewood Lab</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12e0273f84137cfd8e469b4cbacbe682c1e9e7dcc451c440c486fe6f2555b2ee</i> (ID: 31776)<br /><br />Target victim <b>website</b>: <i>englewoodlab.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lc Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31775</link>
<guid>b3df435f52be5287d9ace3b28e2dcac9</guid>
<id>31775</id>
<pubDate>Thu, 30 Apr 2026 00:30:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Lc Industries</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2f5a2a3a457f0c3b9701d50ca0d7bd717778d70888391eb09cd4878120a8eb6</i> (ID: 31775)<br /><br />Target victim <b>website</b>: <i>lcindustries.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>SCS Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31774</link>
<guid>2ab0ebde9cc0cd85fc47ce045d440caf</guid>
<id>31774</id>
<pubDate>Thu, 30 Apr 2026 00:29:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>SCS Engineers</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e44b3c4246f4a6d8f55fd1882f9a1bd0607fc6b312c6fdce7512156918350b7a</i> (ID: 31774)<br /><br />Target victim <b>website</b>: <i>scsengineers.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Epcon Communities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31773</link>
<guid>1f910e9557e4fa6c8f9156e96a02d40a</guid>
<id>31773</id>
<pubDate>Thu, 30 Apr 2026 00:28:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Epcon Communities</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73c30884a045fd3435beb0b401f9af0588dc2ca07d8af8d0a14917414c415c7c</i> (ID: 31773)<br /><br />Target victim <b>website</b>: <i>epconcommunities.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Data Exchange Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31772</link>
<guid>e8305639398f2f0c3d9cf3af2dd09aeb</guid>
<id>31772</id>
<pubDate>Thu, 30 Apr 2026 00:27:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Data Exchange Corporation</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>94e9c971b65ca40226b5d91a256eef2a4a9042dc626cd8479daeb72a05b08efb</i> (ID: 31772)<br /><br />Target victim <b>website</b>: <i>dex.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>SunSource</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31771</link>
<guid>9d5d697ea9ea179f7633708d5478c28f</guid>
<id>31771</id>
<pubDate>Thu, 30 Apr 2026 00:26:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>SunSource</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e02228968b64bf8f3773b6387abab9d1a948d2dc98b36ffebae6825131914bff</i> (ID: 31771)<br /><br />Target victim <b>website</b>: <i>www.sun-source.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>A****y</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31770</link>
<guid>ae8ac5e9dffde5cc03562b4e13ac4394</guid>
<id>31770</id>
<pubDate>Thu, 30 Apr 2026 00:24:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>A****y</b>. The target comes from <b>Non Disponibile</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>844a9d1f7924487310fefdae7c873950d6538d767a62b14841cab8bb2d8e5561</i> (ID: 31770)<br /><br />Target victim <b>website</b>: <i>ape****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>H****o</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31769</link>
<guid>23e18616d10dc96e93805413b83969be</guid>
<id>31769</id>
<pubDate>Thu, 30 Apr 2026 00:24:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>H****o</b>. The target comes from <b>Non Disponibile</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cf0b88ad23f085a9ec854115f221fe03e56bc75b9d53795e2af5d306176aee7</i> (ID: 31769)<br /><br />Target victim <b>website</b>: <i>has****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>F****p</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31768</link>
<guid>576b9b484963479e14d56352f6b383ff</guid>
<id>31768</id>
<pubDate>Thu, 30 Apr 2026 00:24:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>F****p</b>. The target comes from <b>Non Disponibile</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5364d2979fbd060fb546b677bde72cf794c110a20803ad8338f44e5bfb508dc</i> (ID: 31768)<br /><br />Target victim <b>website</b>: <i>fl****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>S****p</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31767</link>
<guid>7b1d3c756fcf7fa90af459bcde18b1d8</guid>
<id>31767</id>
<pubDate>Thu, 30 Apr 2026 00:24:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>S****p</b>. The target comes from <b>Non Disponibile</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26f35699bf9850c447aac8427e6af9cb01ae58f43d80f27d771678291d922519</i> (ID: 31767)<br /><br />Target victim <b>website</b>: <i>s****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>H****l</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31766</link>
<guid>ed3551789fc0376ff8938b6827b16eae</guid>
<id>31766</id>
<pubDate>Thu, 30 Apr 2026 00:24:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>H****l</b>. The target comes from <b>Non Disponibile</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2fcd963615d7d7d0ab09f74de9904c4766bb44258f6cc4c12f0d7f814aaf7960</i> (ID: 31766)<br /><br />Target victim <b>website</b>: <i>t****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>N****a</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31765</link>
<guid>aa954eb9fc47e002ecbf68b60517a3de</guid>
<id>31765</id>
<pubDate>Thu, 30 Apr 2026 00:24:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>N****a</b>. The target comes from <b>Non Disponibile</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f65e5c92137ee734ddb022919391b1cf0f99ce51c046c36b430cee1075e15420</i> (ID: 31765)<br /><br />Target victim <b>website</b>: <i>n****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Color Communications LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31764</link>
<guid>42751fb669b1fe8b899c5a70deb061d8</guid>
<id>31764</id>
<pubDate>Wed, 29 Apr 2026 23:51:34 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>secpo</b> claims attack for <b>Color Communications LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>652d72f8a5127bbfceb122b5b0f8799aafc9f201449faba0c70a93808653d179</i> (ID: 31764)<br /><br />Target victim <b>website</b>: <i>ccicolor.com</i>]]></description>
<category>secpo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Iowa Spring Manufacturing &amp; Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31763</link>
<guid>e834628a514af2290509181bf4348c6d</guid>
<id>31763</id>
<pubDate>Wed, 29 Apr 2026 23:23:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Iowa Spring Manufacturing &amp; Sales</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>727ca76913809c4005afe5de03b47b78b8365dec9921d987b814efe6478c0c28</i> (ID: 31763)<br /><br />Target victim <b>website</b>: <i>iowaspring.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Karl Chevrolet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31762</link>
<guid>ae4b023d09c50fbd267176ede23a3fa7</guid>
<id>31762</id>
<pubDate>Wed, 29 Apr 2026 22:00:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Karl Chevrolet</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5f204c1d1a158f50d105552a7da0b3db6bf94adee67970f560aba4e64bb784a</i> (ID: 31762)<br /><br />Target victim <b>website</b>: <i>www.karlchevrolet.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bentley Capital Ventures</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31761</link>
<guid>b667279b6400b4c05f3b5c4241e8bf7f</guid>
<id>31761</id>
<pubDate>Wed, 29 Apr 2026 21:59:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>radar</b> claims attack for <b>Bentley Capital Ventures</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>565d0f881d5e2adec5d3cc26589ceff60e1318b6877bd2541ba4fd3d36ee1608</i> (ID: 31761)<br /><br />Target victim <b>website</b>: <i>bentleycapitalventures.com</i>]]></description>
<category>radar</category>
</item>
<item xmlns:dc='ns:1'>
<title>PROM (Peakside Ros Outlet Management)</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31760</link>
<guid>a7290c5bd7bc2aaa7ea2b6c957ef639b</guid>
<id>31760</id>
<pubDate>Wed, 29 Apr 2026 21:58:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>PROM (Peakside Ros Outlet Management)</b>. The target comes from <b>Poland</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30e182ef2e7c06b71914642d92f669055b9ceb7a72a995e82f33c8127e579825</i> (ID: 31760)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>zsiclife.co.zm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31759</link>
<guid>e03814c1d555e06aa5d562d95ed29bd2</guid>
<id>31759</id>
<pubDate>Wed, 29 Apr 2026 21:53:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>krybit</b> claims attack for <b>zsiclife.co.zm</b>. The target comes from <b>Zambia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d7a40f220e513ace223a6d09bb28ce59f68f59eaace44555a8d5915dcc2e46a</i> (ID: 31759)<br /><br />Target victim <b>website</b>: <i>zsiclife.co.zm</i>]]></description>
<category>krybit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanta Genetics LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31758</link>
<guid>decff3a1f694fccd108d4ce07b2587b5</guid>
<id>31758</id>
<pubDate>Wed, 29 Apr 2026 21:37:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Advanta Genetics LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1a719e68510bf201bd59ec98df948a5eb0ed8355bff3bd7eb1090f036243254</i> (ID: 31758)<br /><br />Target victim <b>website</b>: <i>aalabs.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baresque Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31757</link>
<guid>af988312978fad72c24e545c31bf8a49</guid>
<id>31757</id>
<pubDate>Wed, 29 Apr 2026 21:36:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Baresque Group</b>. The target comes from <b>Australia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de9b5ac106e7c5fd30ab02a754b2fbd369cd884b6f9b15262a432afb0512e446</i> (ID: 31757)<br /><br />Target victim <b>website</b>: <i>baresquegroup.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cheval Blanc Randheli</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31756</link>
<guid>e58e29db292ff8dfbbe41afb846e469e</guid>
<id>31756</id>
<pubDate>Wed, 29 Apr 2026 21:36:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Cheval Blanc Randheli</b>. The target comes from <b>France</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1450a5e29c1158412dddf88cfe9a9b220c12a092c7106ab30e6bb2281ac0ef77</i> (ID: 31756)<br /><br />Target victim <b>website</b>: <i>chevalblanc.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law Offices of Michael A. Freedman, P.A. (maflaw.com)</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31755</link>
<guid>4ecb8876b622f561d9d13161071f518c</guid>
<id>31755</id>
<pubDate>Wed, 29 Apr 2026 21:35:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Law Offices of Michael A. Freedman, P.A. (maflaw.com)</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ccae79ff2f69b86f92875aade4b1ea4e43c4615198787600903509dde72493c</i> (ID: 31755)<br /><br />Target victim <b>website</b>: <i>maflaw.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlas Metal Industries Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31754</link>
<guid>0207ceaa30eeb7df0c51ed30959480ec</guid>
<id>31754</id>
<pubDate>Wed, 29 Apr 2026 21:35:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Atlas Metal Industries Inc</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f38ee012b560f6a27ddcdf3075aaec18f8e8c61645ae53d683af54bbf5cb455f</i> (ID: 31754)<br /><br />Target victim <b>website</b>: <i>atlasfoodserv.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Costa Solutions, LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31753</link>
<guid>56fe38b77cb4f52e8f2770e874f57875</guid>
<id>31753</id>
<pubDate>Wed, 29 Apr 2026 21:35:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Costa Solutions, LLC</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21fbe7230b2f36501ab4dee782a10be1fd439a28fa0ef2a9ebdebacd0561e92d</i> (ID: 31753)<br /><br />Target victim <b>website</b>: <i>costasolutions.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bayou Title, Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31752</link>
<guid>4371a529ba9a419a1dc903bcd8856251</guid>
<id>31752</id>
<pubDate>Wed, 29 Apr 2026 21:34:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Bayou Title, Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0205491ff52497df3d511d8cd992285d644580c55357f2c19db850bb0c6af916</i> (ID: 31752)<br /><br />Target victim <b>website</b>: <i>bayoutitle.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eduporium</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31747</link>
<guid>3066b11b58eb7fb925b67d25c54e3234</guid>
<id>31747</id>
<pubDate>Wed, 29 Apr 2026 19:55:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Eduporium</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>190800a1c011e724e9b72cd358a67444d01b56c27a80b3ae452dda48cb73f287</i> (ID: 31747)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Probity Contracting Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31748</link>
<guid>144679b5d1ddb8650c3155c645a1d976</guid>
<id>31748</id>
<pubDate>Wed, 29 Apr 2026 19:55:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Probity Contracting Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc6bb6e7e013507fb7e6abdc5e74547bef9e24ba2bf0cdb0e4709cdb3a5586ee</i> (ID: 31748)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metro-ILA Funds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31749</link>
<guid>4295cd213a56a1c6ec066caf5dd08f16</guid>
<id>31749</id>
<pubDate>Wed, 29 Apr 2026 19:55:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Metro-ILA Funds</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce0a1b79713ec1f9e67ed76313b4830c37c4e1f3441f3301b6ae1d87eafe40fb</i> (ID: 31749)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Edenshaw Developments</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31750</link>
<guid>61905c201ff056edbc80a8e7d634d5c1</guid>
<id>31750</id>
<pubDate>Wed, 29 Apr 2026 19:55:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Edenshaw Developments</b>. The target comes from <b>Canada</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b0b7702f35a4ef4c7b351fab85d78f8cee73220a4cd52f186a8b091ab713833</i> (ID: 31750)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Antica Sartoria</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31751</link>
<guid>13a69ec888022968c96b79f48f62fd2a</guid>
<id>31751</id>
<pubDate>Wed, 29 Apr 2026 19:55:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Antica Sartoria</b>. The target comes from <b>Italy</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4562c9212eb3606842b6cb3aaab4385d40dfa2be94ce744206769b43dcc624c7</i> (ID: 31751)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>planetsport.ma</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31746</link>
<guid>b57a35f9dda9f73ab2c04e1a6963c932</guid>
<id>31746</id>
<pubDate>Wed, 29 Apr 2026 10:33:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>planetsport.ma</b>. The target comes from <b>Marocco</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b41192a82492874df53703b28204b8ec6862312285fd22cc4942ae22515b5486</i> (ID: 31746)<br /><br />Target victim <b>website</b>: <i>planetsport.ma</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>pricon.com.ph</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31745</link>
<guid>ed21b54c417d6d8638aef8efc652fe37</guid>
<id>31745</id>
<pubDate>Wed, 29 Apr 2026 10:32:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>pricon.com.ph</b>. The target comes from <b>Philippines</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ce460bff0385f80ca1178e1fae6c87fe9e4a0bf3b1e76aa7212eb7dbe89f4cf</i> (ID: 31745)<br /><br />Target victim <b>website</b>: <i>pricon.com.ph</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>instapack.es</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31744</link>
<guid>986e781559edbb32e805d4b135780812</guid>
<id>31744</id>
<pubDate>Wed, 29 Apr 2026 10:32:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>instapack.es</b>. The target comes from <b>Spain</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d47af6dccb0588fe986437c0852ed9efe7a0916c0ad660d554f12313d54f84b</i> (ID: 31744)<br /><br />Target victim <b>website</b>: <i>instapack.es</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>stllc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31743</link>
<guid>59b6525364c77d1e6f9c79c53e387954</guid>
<id>31743</id>
<pubDate>Wed, 29 Apr 2026 10:32:22 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>stllc.org</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0520082af8a0475d5acd9b6d6911926bd240f59270f23b1aacd612139f46495b</i> (ID: 31743)<br /><br />Target victim <b>website</b>: <i>stllc.org</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>dmschweiz.ch</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31742</link>
<guid>c545987fb970f7b1f05c9f2a2f3340dd</guid>
<id>31742</id>
<pubDate>Wed, 29 Apr 2026 10:10:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>dmschweiz.ch</b>. The target comes from <b>Switzerland</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fcc67b6297038931598b98aa3cb36b6539cbe2090b620a5aad4fcf32ad6b1e9</i> (ID: 31742)<br /><br />Target victim <b>website</b>: <i>dmschweiz.ch</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>anvilarts.org.uk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31741</link>
<guid>2ab5569b4274a31c7f2b7c67cd9ba9e2</guid>
<id>31741</id>
<pubDate>Wed, 29 Apr 2026 10:10:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>anvilarts.org.uk</b>. The target comes from <b>UK</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac059e6799ddceba6682e05a5e0405dceef6f1041e5501f41b714bee3d7db016</i> (ID: 31741)<br /><br />Target victim <b>website</b>: <i>anvilarts.org.uk</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>primeproperties.com.au</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31740</link>
<guid>fb6cf395c453fdafb241d6d887e6aefe</guid>
<id>31740</id>
<pubDate>Wed, 29 Apr 2026 10:10:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>primeproperties.com.au</b>. The target comes from <b>Australia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca950f305b94dae9f987607f078ca8009eba86c6fafb3b519e36a54833dee554</i> (ID: 31740)<br /><br />Target victim <b>website</b>: <i>primeproperties.com.au</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>airdriephysio.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31739</link>
<guid>16a359f1f323bca3b0448e6c8ca5bec5</guid>
<id>31739</id>
<pubDate>Wed, 29 Apr 2026 10:09:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>airdriephysio.com</b>. The target comes from <b>Canada</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9acc950c0ace9d2d7cc0aee45c2a67b695cf15e15f3e079f973d316ebe8982e</i> (ID: 31739)<br /><br />Target victim <b>website</b>: <i>airdriephysio.com</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>rainforestclean.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31738</link>
<guid>dbaebce9c842f6aa7482517597c75c8c</guid>
<id>31738</id>
<pubDate>Wed, 29 Apr 2026 10:09:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>rainforestclean.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f50728ec93640d5ca8341cf1fcdfb7c89444d919e9e44db1e1dbfde3edc44e9a</i> (ID: 31738)<br /><br />Target victim <b>website</b>: <i>rainforestclean.com</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>rotak.it</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31737</link>
<guid>29430ba87f428a5f10b3a531b0761f15</guid>
<id>31737</id>
<pubDate>Wed, 29 Apr 2026 10:09:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>rotak.it</b>. The target comes from <b>Italy</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b412664f6b126388d45055f434451c655b2f8082de938f19fbc4fd2aa32483fe</i> (ID: 31737)<br /><br />Target victim <b>website</b>: <i>rotak.it</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>osoftec.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31736</link>
<guid>0df5627695c1aaf2a2be5c738a80f0c3</guid>
<id>31736</id>
<pubDate>Wed, 29 Apr 2026 10:08:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>osoftec.com</b>. The target comes from <b>India</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ce2dcab484894fe3d78244932e68d88b2ecd81cb138ddd03a684515a5f9a13b</i> (ID: 31736)<br /><br />Target victim <b>website</b>: <i>osoftec.com</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>boxtopia.co.uk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31735</link>
<guid>e35adc826b021f91f72f183d1bb24773</guid>
<id>31735</id>
<pubDate>Wed, 29 Apr 2026 10:08:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>boxtopia.co.uk</b>. The target comes from <b>UK</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a16ed7a1a16f44aad08e7297270f8c262a7de2e488dcd26b47e8390a97a16e43</i> (ID: 31735)<br /><br />Target victim <b>website</b>: <i>boxtopia.co.uk</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mediaworks Kft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31733</link>
<guid>93aaa29263d4040a9099001cc887d333</guid>
<id>31733</id>
<pubDate>Wed, 29 Apr 2026 03:56:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Mediaworks Kft</b>. The target comes from <b>Hungary</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6e3838cbf35f816877575b08f964cae18b5a0c356bbdc196882c8699d8232ad</i> (ID: 31733)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>https://www.fulcrumre.com/</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31734</link>
<guid>effa3b908aaa9f8744b980829a6bfd15</guid>
<id>31734</id>
<pubDate>Wed, 29 Apr 2026 02:23:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>https://www.fulcrumre.com/</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2624000b9d0697a2c75c098e7aa0deeab6591c3f3d6afb8ef02a9862db149c8b</i> (ID: 31734)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>nbd3pl.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31732</link>
<guid>407688b935e4079fecd2b2daefb6432e</guid>
<id>31732</id>
<pubDate>Wed, 29 Apr 2026 00:22:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>nbd3pl.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78da6e95ee46e433a61c2da1b393c0d490abc104747e81c0d2f82f86f35d37a8</i> (ID: 31732)<br /><br />Target victim <b>website</b>: <i>nbd3pl.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Indonesia&#039;s Customs Analytics Platform</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31731</link>
<guid>5ec11c9c51904e1a37a76d1acc14aa0f</guid>
<id>31731</id>
<pubDate>Tue, 28 Apr 2026 22:52:08 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Indonesia&#039;s Customs Analytics Platform</b>. The target comes from <b>Indonesia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d06b37c189f3a83812c096ec1013c46114bfdbfce4d12b2bf5fa369577306f9</i> (ID: 31731)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>cadencepetroleum.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31730</link>
<guid>306ee6a27d95b01dd69ee72920cf25ed</guid>
<id>31730</id>
<pubDate>Tue, 28 Apr 2026 20:51:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>cadencepetroleum.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ab47fb118b99fa27aef1f6db70e77d24d5699c10d82d089c40e4ce5a8a7867b</i> (ID: 31730)<br /><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/cadence-petroleum-group/476578914|</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nephrology Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31729</link>
<guid>2325577fcece567803aff8703a899116</guid>
<id>31729</id>
<pubDate>Tue, 28 Apr 2026 20:25:01 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Nephrology Associates</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bdd582a3ffc7fd61131d94c4bf85f39678f2c4b6cbbdbced918c88aaa82bad14</i> (ID: 31729)<br /><br />Target victim <b>website</b>: <i>www.arnapa.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Basch &amp; Keegan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31724</link>
<guid>045723a2e194ae8b07890dace311b402</guid>
<id>31724</id>
<pubDate>Tue, 28 Apr 2026 19:54:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Basch &amp; Keegan</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04dc432059295e32e5667769cee15a3cf6d59bcc02f284e9a0ff14446dbf64e5</i> (ID: 31724)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Silicon Alley</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31725</link>
<guid>cb5f437833b580d047e697e150c45c57</guid>
<id>31725</id>
<pubDate>Tue, 28 Apr 2026 19:54:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Silicon Alley</b>. The target comes from <b>UK</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c999e9d19515f805f4c8a724bd72410fc52ce31f1c59dc776a126b9999ea28a</i> (ID: 31725)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>KarmaData</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31726</link>
<guid>0f7a529e4a851625fee72161a84b4ca1</guid>
<id>31726</id>
<pubDate>Tue, 28 Apr 2026 19:54:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>KarmaData</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5c653ead4aaff95fedc38e1129fbafeaee5aeb9a0012839a282242910378eec</i> (ID: 31726)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>TYLin International Group - Taiwan Branch</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31727</link>
<guid>effbb64ff6c9b38c6fcb05185cd22fc3</guid>
<id>31727</id>
<pubDate>Tue, 28 Apr 2026 18:55:24 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>TYLin International Group - Taiwan Branch</b>. The target comes from <b>Taiwan</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>764650e4bda40d7e726c112b77fe03a222e5ba9a7c4881ab099dfe102fe764b9</i> (ID: 31727)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Construction Sciences</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31728</link>
<guid>dcd452092643b695257a74108459b8f3</guid>
<id>31728</id>
<pubDate>Tue, 28 Apr 2026 18:55:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Construction Sciences</b>. The target comes from <b>Australia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03119eec85fa350a7fd8d1092457cebdecee6eb653adb4c52fd18691ba148b27</i> (ID: 31728)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Floyd Skeren Manukian Langevin, LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31723</link>
<guid>b903548eebca1c3b8a3b81e5002f3490</guid>
<id>31723</id>
<pubDate>Tue, 28 Apr 2026 14:45:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Floyd Skeren Manukian Langevin, LLP</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba150023491e32df8be28e7366192aeb3e09a45a0fe04524d6e57aee81dc144f</i> (ID: 31723)<br /><br />Target victim <b>website</b>: <i>floydskerenlaw.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>INJURYLAWYERS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31722</link>
<guid>27e34e1093ba7e24075b9f5b25dcf5a7</guid>
<id>31722</id>
<pubDate>Tue, 28 Apr 2026 14:39:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>INJURYLAWYERS.COM</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a345134aeb76fb1259b28b56032389b60a8af1fdba09920529da9207ef96295f</i> (ID: 31722)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DIME Distribuidora</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31718</link>
<guid>5ffebde8e98ee4b9c98fcc1b30fffef6</guid>
<id>31718</id>
<pubDate>Tue, 28 Apr 2026 13:55:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>DIME Distribuidora</b>. The target comes from <b>Brazil</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd041698b2b22fe21edabdb243dfb1d27fe865c952fab75981399ef254b58418</i> (ID: 31718)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carma Packaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31719</link>
<guid>4493a8d38776f690a0b661af37a30cfe</guid>
<id>31719</id>
<pubDate>Tue, 28 Apr 2026 13:55:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Carma Packaging</b>. The target comes from <b>India</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dcf20bf59b4abe585c0399dcd79451b9de9f67d84a5ec1af90abe6cf6213b78e</i> (ID: 31719)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Intikom</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31720</link>
<guid>0ff9d78576b6c07d814ae5daab2e8d28</guid>
<id>31720</id>
<pubDate>Tue, 28 Apr 2026 13:55:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Intikom</b>. The target comes from <b>Indonesia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>022bb0fdad11b22b2827b2ebfab5b7c4038c5fe58edb71eb8f0c9938a06cfce8</i> (ID: 31720)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>moser-spiel.at</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31721</link>
<guid>b9e702b9182246d9ad08bef0c2229f6b</guid>
<id>31721</id>
<pubDate>Tue, 28 Apr 2026 12:34:00 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>krybit</b> claims attack for <b>moser-spiel.at</b>. The target comes from <b>Austria</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ac8a686f34d0dbaaab766c9ca49c5598ca81bed16251ae177869a97eb2b371a</i> (ID: 31721)<br /><br />Target victim <b>website</b>: <i>moser-spiel.at</i>]]></description>
<category>krybit</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.durable-tech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31717</link>
<guid>1dbdb6a977dd83e68f9078c05da938c6</guid>
<id>31717</id>
<pubDate>Tue, 28 Apr 2026 09:41:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>www.durable-tech.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b43e7e1578c15621ae1ca00c07785536c683837525027916de1ea26a2c3257ef</i> (ID: 31717)<br /><br />Target victim <b>website</b>: <i>www.durable-tech.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vimeo, Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31716</link>
<guid>3d1ed124d48ac4f12106b32decf840b0</guid>
<id>31716</id>
<pubDate>Tue, 28 Apr 2026 05:38:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Vimeo, Inc.</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>435fc106f5766671d53c12474f0f4b98708d661eba1cf427fa7f28462dd852c9</i> (ID: 31716)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Super AI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31715</link>
<guid>4c24085bb62faf1e7e113767f837802d</guid>
<id>31715</id>
<pubDate>Tue, 28 Apr 2026 04:12:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Super AI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36cb8516e57efdc7d17d4111f7c579d415407da7a43cff9d714fe10d453a21e5</i> (ID: 31715)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>sumacinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31714</link>
<guid>4635d9474a5ef94cd03d40e385f4b177</guid>
<id>31714</id>
<pubDate>Tue, 28 Apr 2026 03:26:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>sumacinc.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b62dc48929cd018938f15baf643fee1294f347acc26a62c4bd1521ce61c5b70e</i> (ID: 31714)<br /><br />Target victim <b>website</b>: <i>sumacinc.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cybersecurity Vendor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31713</link>
<guid>a5be7e784650548b8fc47a6d067b52b4</guid>
<id>31713</id>
<pubDate>Tue, 28 Apr 2026 01:54:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Cybersecurity Vendor</b>. The target comes from <b>Non Disponibile</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>00281362fd5ec47933b289c3d85284436bf32adf72350c23633a5193d45361a8</i> (ID: 31713)<br /><br />Target victim <b>website</b>: <i>*********.***</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lifeline PCS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31712</link>
<guid>872def1eaad20180f042ac8764629220</guid>
<id>31712</id>
<pubDate>Mon, 27 Apr 2026 22:53:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Lifeline PCS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb5f2e924603d680ad8f8e67b004e3b147e5305e517135af965956222b27c295</i> (ID: 31712)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Birtcher Anderson &amp; Davis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31710</link>
<guid>c070bfe7f385b5bdda1dcd920c4965a6</guid>
<id>31710</id>
<pubDate>Mon, 27 Apr 2026 21:52:42 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Birtcher Anderson &amp; Davis</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>069fd3e918853fcea8e00d079438753a56c58ef60323a49b30c342b0bb9283a8</i> (ID: 31710)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Leone Film Group SpA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31711</link>
<guid>3b155e7975caedac55e57c64b23d2843</guid>
<id>31711</id>
<pubDate>Mon, 27 Apr 2026 21:52:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Leone Film Group SpA</b>. The target comes from <b>Italy</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c70b60f76b1e38af4df19c957c5d6e882e86328644de4c43a5a887af82827da9</i> (ID: 31711)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Floyd Skeren Manukian Langevin, LLP Information</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31709</link>
<guid>b96a8bcf64591ca8e9c43f114de1daba</guid>
<id>31709</id>
<pubDate>Mon, 27 Apr 2026 18:38:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Floyd Skeren Manukian Langevin, LLP Information</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd1756132e6fdd7242c9378bb9401a893e89cf84a3d97fca100c151c8a4485d2</i> (ID: 31709)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>medikaplaza.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31701</link>
<guid>95133894ec11a574d25413576636e5dc</guid>
<id>31701</id>
<pubDate>Mon, 27 Apr 2026 16:51:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>medikaplaza.com</b>. The target comes from <b>Indonesia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a483f8c2da2eac66df53d4e8a587cd4d412c689e9d971b2677b0a3cb5668c00f</i> (ID: 31701)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>jgpetrucci.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31702</link>
<guid>ac3811a6c6bb180aa7db3e94fdab42cc</guid>
<id>31702</id>
<pubDate>Mon, 27 Apr 2026 16:51:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>jgpetrucci.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a698caa8b43ed7752cc9d269e9ecf687ae6ec9cb5cd553afe02ac28950f7d1e6</i> (ID: 31702)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>providentgh.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31708</link>
<guid>9f205dad67b7407fec00834c17b2cf2e</guid>
<id>31708</id>
<pubDate>Mon, 27 Apr 2026 16:41:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>providentgh.com</b>. The target comes from <b>Ghana</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f062886e5c64cffd2cc266cd660658d3709774f832be73d24d0f4010a1a0a34d</i> (ID: 31708)<br /><br />Target victim <b>website</b>: <i>providentgh.com</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>Promotion AB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31707</link>
<guid>d13f6aa1117f0a36d3478a998f9925b7</guid>
<id>31707</id>
<pubDate>Mon, 27 Apr 2026 16:36:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Promotion AB</b>. The target comes from <b>Sweden</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95a3485bed1f09b0b5c4a8cae3ee1151f0529b69ad37dd3e656e37892e5a3cd8</i> (ID: 31707)<br /><br />Target victim <b>website</b>: <i>promotionab.se</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stelia North America</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31706</link>
<guid>71c22e78ccb5dfc734b019cc77a5c796</guid>
<id>31706</id>
<pubDate>Mon, 27 Apr 2026 16:12:25 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Stelia North America</b>. The target comes from <b>Canada</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16fe3ba8630c9a97675267e7d1234e9098f82d4cd316b99db1d9b105ebe864a9</i> (ID: 31706)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>TokyoHosoKogyo Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31684</link>
<guid>e7ff9f6c0d2b46f4b4560c29ed23a582</guid>
<id>31684</id>
<pubDate>Mon, 27 Apr 2026 15:52:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>TokyoHosoKogyo Corporation</b>. The target comes from <b>Japan</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>833a92539c61584b27510b0b276dc2abad8d0ca7d9c282492579570ca1a7a116</i> (ID: 31684)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ibswebsite.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31685</link>
<guid>f65c00c041bab77ab44874be15c53276</guid>
<id>31685</id>
<pubDate>Mon, 27 Apr 2026 15:51:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>ibswebsite.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d1556a04f6783639e890500240ad81b8d6bb0dbbe9ff92e9cf35320b6a005b4f</i> (ID: 31685)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>delonhampton.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31686</link>
<guid>1f034ade6c58fc442a66e4b2b71abbf8</guid>
<id>31686</id>
<pubDate>Mon, 27 Apr 2026 15:51:58 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>delonhampton.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c03949c9ca0f1c023dd72d19ae1fa7d6ba492ecf76fd52532ef907fa669354e4</i> (ID: 31686)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>aotco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31687</link>
<guid>14f97b191b6fa0838c21882579b1e65a</guid>
<id>31687</id>
<pubDate>Mon, 27 Apr 2026 15:51:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>aotco.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>547f9db4159e02d7f7d2b3e608b1df5b55a4a66436292696347e6686d1425715</i> (ID: 31687)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>wmsopko.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31688</link>
<guid>7d1fb6b4eec12bee96b88020c7afadb8</guid>
<id>31688</id>
<pubDate>Mon, 27 Apr 2026 15:51:56 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>wmsopko.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c260d31e80835044d03281beb46ea2ff83ad93fb96e23093f041382add25186b</i> (ID: 31688)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>andrewtjohnson.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31689</link>
<guid>4538579b59251aec5bda1a4dce588ba4</guid>
<id>31689</id>
<pubDate>Mon, 27 Apr 2026 15:51:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>andrewtjohnson.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e3bfae404f6e8ccfc424ab9d482794a272744f87e901da9790fdfb3e5f466ff</i> (ID: 31689)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>fatbrands.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31690</link>
<guid>f33c64866907e92c0fe0ed10fcb56c9f</guid>
<id>31690</id>
<pubDate>Mon, 27 Apr 2026 15:51:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>fatbrands.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e49a298ed1c3c0732f880fad136108dacc2b91938e4f5333f8308a335f98603</i> (ID: 31690)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>mopec.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31691</link>
<guid>3218b56a27cc5d3acdac4a6b99195f75</guid>
<id>31691</id>
<pubDate>Mon, 27 Apr 2026 15:51:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>mopec.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09d01f576a5f0b76ae0053f56c0cc89111bca5c5bd2a776957de657cb171b408</i> (ID: 31691)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>avalonflooring.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31692</link>
<guid>cb2934ae5683eff802277d627c0ed3d3</guid>
<id>31692</id>
<pubDate>Mon, 27 Apr 2026 15:51:52 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>avalonflooring.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8f62cfb2b4dc65c971d64290125195d9eeca749b497b2a07dc9c7ff3d44be13</i> (ID: 31692)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>gelatissimo.com.au</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31693</link>
<guid>768d8f38d2f661ce5189874474bf4e72</guid>
<id>31693</id>
<pubDate>Mon, 27 Apr 2026 15:51:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>gelatissimo.com.au</b>. The target comes from <b>Australia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f71f971c893f033d76dd9f06ce4f4f4892fa76d2917b082da5fb45bcb3e39f89</i> (ID: 31693)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>rosehillgardens.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31694</link>
<guid>afcf99a084ec63c94f1cf5094ba2b133</guid>
<id>31694</id>
<pubDate>Mon, 27 Apr 2026 15:51:50 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>rosehillgardens.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8aab7f602bf113457c861de2b2a6da6874fb39777a08ebdceb0c77a62b4c2a8</i> (ID: 31694)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>massdevelopment.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31695</link>
<guid>36ab35b3020f5896ae18fc41567b76a1</guid>
<id>31695</id>
<pubDate>Mon, 27 Apr 2026 15:51:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>massdevelopment.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24feb4b1d9d3938427ce90f67ea7b33c93d4c0ed06f4ff5337f67fd660ab12d4</i> (ID: 31695)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Raich Sp. z o.o.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31705</link>
<guid>c5bfd2f128b8ad4744560fda1eab52bb</guid>
<id>31705</id>
<pubDate>Mon, 27 Apr 2026 15:48:55 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Raich Sp. z o.o.</b>. The target comes from <b>Poland</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7921ea1f1c3292ac7935620021e06504ce456a2e9e15ac865b3ecd4e03f2559f</i> (ID: 31705)<br /><br />Target victim <b>website</b>: <i>raich.net</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>P**g**s***e O*al S**g**y &amp; I**la**ol**y</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31704</link>
<guid>0fe75661398d80efa6fc1640ce09d971</guid>
<id>31704</id>
<pubDate>Mon, 27 Apr 2026 14:57:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>P**g**s***e O*al S**g**y &amp; I**la**ol**y</b>. The target comes from <b>Non Disponibile</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c70da8c17b39d6840eb13e9115fd284146e168eda7f45e52ea31e87a6fa6fe67</i> (ID: 31704)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>J**es **l*o</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31703</link>
<guid>39f4bdc74fe2fa9312f7eff5335c00c5</guid>
<id>31703</id>
<pubDate>Mon, 27 Apr 2026 14:57:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>J**es **l*o</b>. The target comes from <b>Non Disponibile</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>80bca939ac7e651b08a1bb6b848740cbeb8d8e42ad69d4fc6a5d47f0754f6a83</i> (ID: 31703)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>grupo-principal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31696</link>
<guid>9df29dfc87cdbdecd4150b24fc63c52c</guid>
<id>31696</id>
<pubDate>Mon, 27 Apr 2026 14:54:45 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>grupo-principal.com</b>. The target comes from <b>Mexico</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2724fbbf558b77a0ca1ecdb67247010130fbadddb025f2cc7b2a0be104ad834</i> (ID: 31696)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>cofaco.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31697</link>
<guid>e6dc5789517d0ecd1b071903c4810eaa</guid>
<id>31697</id>
<pubDate>Mon, 27 Apr 2026 14:54:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>cofaco.com</b>. The target comes from <b>Peru</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df3ea52fe7e05c62508b4e9e799776602504a930df095cbde9a779ae38a59ec1</i> (ID: 31697)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>dunav.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31698</link>
<guid>6e6b9075117b29df027aeab02d92dab9</guid>
<id>31698</id>
<pubDate>Mon, 27 Apr 2026 14:54:43 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>dunav.com</b>. The target comes from <b>Serbia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b4da0a30efc9e15939071a8e424018697a2549ca39dfcc65d1d482e16a623861</i> (ID: 31698)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>BELFOR</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31700</link>
<guid>63b7cfecf5585795a08cde4e46a2af36</guid>
<id>31700</id>
<pubDate>Mon, 27 Apr 2026 14:20:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>BELFOR</b>. The target comes from <b>Singapore</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8aba27c7e5eb617b056f88b6052929138c82aecebfdd9425acca5dcc325c53c2</i> (ID: 31700)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Selex - Gruppo Commerciale</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31699</link>
<guid>7bc22204fbaa5ff29a4e5a64f77dde89</guid>
<id>31699</id>
<pubDate>Mon, 27 Apr 2026 14:19:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Selex - Gruppo Commerciale</b>. The target comes from <b>Italy</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a836a682ac5924aae0371b8b5779dbe03c3bc2b6c251ce3c8a70b424523cc85</i> (ID: 31699)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>algosaibi-gtb.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31680</link>
<guid>32ce0ec3ee6f3951004c8ebb7511ffc1</guid>
<id>31680</id>
<pubDate>Mon, 27 Apr 2026 12:54:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>algosaibi-gtb.com</b>. The target comes from <b>Saudi Arabia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd4a3ad9054108f1ecfdb9afcf3adb949e8912c1ce84bd951721a09a1f89c503</i> (ID: 31680)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>alx-pc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31681</link>
<guid>b3f1ba764509b453d6cc48e0969e5cb7</guid>
<id>31681</id>
<pubDate>Mon, 27 Apr 2026 12:54:28 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>alx-pc.com</b>. The target comes from <b>Egypt</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9f702be2fec1ccf6eeefde212e87023f7370b9bf2c71b3e7faa6b913e5d9976e</i> (ID: 31681)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>arrawdah.org.sa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31682</link>
<guid>5b47e496430dde1ee7c597dca0e2f57d</guid>
<id>31682</id>
<pubDate>Mon, 27 Apr 2026 12:54:27 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>arrawdah.org.sa</b>. The target comes from <b>Saudi Arabia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b54db844a29a02a38ac579a5322ab7b4a9f353206abece4a54caf4b93905ece1</i> (ID: 31682)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>ldisolutions.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31683</link>
<guid>cd6539b09d112a53ba4098fe605df806</guid>
<id>31683</id>
<pubDate>Mon, 27 Apr 2026 12:49:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>ldisolutions.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cd356bccd1407b59c7d3ab6e91793b2cefbeaa0474981ca89cace11e2b31381</i> (ID: 31683)<br /><br />Target victim <b>website</b>: <i>ldisolutions.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Inspira</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31674</link>
<guid>1846568d5a791a321a2b27eb5734dded</guid>
<id>31674</id>
<pubDate>Mon, 27 Apr 2026 08:55:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Inspira</b>. The target comes from <b>Portorico</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e00496f84bd8246dd12b1b37b6d5db1f7ccb12d079c2ab705517d5289e584180</i> (ID: 31674)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rural Municipality of Gimli</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31679</link>
<guid>d4bc7c8d13eb8284436c4498f37f4a7a</guid>
<id>31679</id>
<pubDate>Mon, 27 Apr 2026 08:16:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>Rural Municipality of Gimli</b>. The target comes from <b>Canada</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>633c57ae93d7ac4430689019d2a10c04ea9092d75cba48bb61c37074d185801d</i> (ID: 31679)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>RT Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31678</link>
<guid>6d4c6e964bc0078884cb7b22838b827b</guid>
<id>31678</id>
<pubDate>Mon, 27 Apr 2026 07:58:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>tridentlocker</b> claims attack for <b>RT Software</b>. The target comes from <b>UK</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>05d8ae24ddbd6e2a9aae33485cea4fe6577f59ab507609aacac4590327e3f58d</i> (ID: 31678)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>tridentlocker</category>
</item>
<item xmlns:dc='ns:1'>
<title>Narteks Tekstil A.S</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31677</link>
<guid>6052639706e0beb2fabeaf09d667f9b9</guid>
<id>31677</id>
<pubDate>Mon, 27 Apr 2026 07:46:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>krybit</b> claims attack for <b>Narteks Tekstil A.S</b>. The target comes from <b>Turkey</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3863492b3c7a864a69606887a326df79777c2ef07663bc5201f75792e9c5c00b</i> (ID: 31677)<br /><br />Target victim <b>website</b>: <i>Narteks Tekstil A.S</i>]]></description>
<category>krybit</category>
</item>
<item xmlns:dc='ns:1'>
<title>MTCI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31676</link>
<guid>7974a38b2a42268066c03442b2cc922b</guid>
<id>31676</id>
<pubDate>Mon, 27 Apr 2026 07:38:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>MTCI</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>949fe514cdc98979390f2420c0f4d69d1266241c83905df417ee361a57214b42</i> (ID: 31676)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>reddycardiology.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31675</link>
<guid>f7652e68e0da3f415d7a0cb66da9c510</guid>
<id>31675</id>
<pubDate>Mon, 27 Apr 2026 07:38:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>reddycardiology.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88390be8ed5deffa0e6c3759aa0ae21409f6b12768f3abadde1dfcb7501df700</i> (ID: 31675)<br /><br />Target victim <b>website</b>: <i>reddycardiology.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Synmosa Biopharma</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31673</link>
<guid>f8ddf6d7c12e62d733cb1ebc55cb5511</guid>
<id>31673</id>
<pubDate>Sun, 26 Apr 2026 20:57:48 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Synmosa Biopharma</b>. The target comes from <b>Taiwan</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28bad9617c7f13f50c72537f55f1819d8377fd7dbfeaa62720a49371eff98a89</i> (ID: 31673)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Longwood Engineering Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31669</link>
<guid>83a203ccb030a515102d02037f2af2f4</guid>
<id>31669</id>
<pubDate>Sun, 26 Apr 2026 19:56:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Longwood Engineering Company</b>. The target comes from <b>UK</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e89b39897b762cc25c509e7b7430fed98091dee38b04b8ffd99b1fd1b0d3b72a</i> (ID: 31669)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>A &amp; A Building Material</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31670</link>
<guid>031f41342d850a9c4e0997d626ffe73c</guid>
<id>31670</id>
<pubDate>Sun, 26 Apr 2026 19:56:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>A &amp; A Building Material</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4516b1c49818427da816103e9b5fbd6f12eb54782fd9411bf5a61f6ae3b2c506</i> (ID: 31670)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Exclusive Networks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31671</link>
<guid>7ddfdc796b49a4c12da5e0651d2f9b94</guid>
<id>31671</id>
<pubDate>Sun, 26 Apr 2026 18:57:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Exclusive Networks</b>. The target comes from <b>France</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5f5ed313e12729c292299768e25a7dc8af58510c56c458b175009191c8ece0c</i> (ID: 31671)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Istarpal</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31672</link>
<guid>7b9c4776c1fc3142bad2cdf062d90cb7</guid>
<id>31672</id>
<pubDate>Sun, 26 Apr 2026 18:57:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Istarpal</b>. The target comes from <b>Singapore</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>444edc10bcd2f3cd48c51605e87f2b3a7a0074c8d750546ad51e828aeea83d74</i> (ID: 31672)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Walman Optical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31664</link>
<guid>3484575740e7d74362f6a1ab0ac89a50</guid>
<id>31664</id>
<pubDate>Sun, 26 Apr 2026 16:15:23 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>medusa</b> claims attack for <b>Walman Optical</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e97395d1328a60673af8058e74a743606b0e48f537e9966de494d76953cbb18f</i> (ID: 31664)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>medusa</category>
</item>
<item xmlns:dc='ns:1'>
<title>EEC Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31668</link>
<guid>d2e0cd9827a0e602372279400b09c4f5</guid>
<id>31668</id>
<pubDate>Sun, 26 Apr 2026 15:52:07 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>EEC Group</b>. The target comes from <b>Egypt</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f555b019ab45a40f8413f39e7cdc3f522601957d8b4f3e49dad445237bc4320d</i> (ID: 31668)<br /><br />Target victim <b>website</b>: <i>eecegypt.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Coralina</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31667</link>
<guid>365e0c4ae46e73e9e0ecdfa4e158d3a5</guid>
<id>31667</id>
<pubDate>Sun, 26 Apr 2026 15:52:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Coralina</b>. The target comes from <b>Colombia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14812d23d7b9dc57fa868918bbf7393363fa9e2abfa49cd3d5eefff3daea3e50</i> (ID: 31667)<br /><br />Target victim <b>website</b>: <i>coralina.gov.co</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lawson Software</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31666</link>
<guid>d9deef9391900ec69c80ff56917f3956</guid>
<id>31666</id>
<pubDate>Sun, 26 Apr 2026 15:51:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Lawson Software</b>. The target comes from <b>Thailand</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3946b8170c13ebf2a834ec58ef405fbb513e21708c80a6467a620040d0c53a42</i> (ID: 31666)<br /><br />Target victim <b>website</b>: <i>lawson.co.th</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Suzhou Yike Kejian</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31665</link>
<guid>1a56a7fdcd92b1520a3508d47cb5adbb</guid>
<id>31665</id>
<pubDate>Sun, 26 Apr 2026 15:51:53 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Suzhou Yike Kejian</b>. The target comes from <b>China</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c81c449410d4424f58f365bbcba40f6814274e48995006b0a1187d582442227</i> (ID: 31665)<br /><br />Target victim <b>website</b>: <i>dnb.com/business-directory/company-profiles.suzhou_yike_kejian_architectural_design_research_institute_co_ltd_nanjing_bra_nch.12f22121a67d4f912a7d8a5b634d830a.html</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>bladex.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31663</link>
<guid>47c95199b010148056eda6ac6f961c63</guid>
<id>31663</id>
<pubDate>Sun, 26 Apr 2026 09:55:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>bladex.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a98eb4c40ac2c332770595e141390839afd7d5ae3cc209b4fdcf8be96e0a9611</i> (ID: 31663)<br /><br />Target victim <b>website</b>: <i>bladex.com</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>heinrichs-logistic.de</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31662</link>
<guid>fdbdddfe8c4df643ec18e5f931bada26</guid>
<id>31662</id>
<pubDate>Sun, 26 Apr 2026 09:54:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>heinrichs-logistic.de</b>. The target comes from <b>Germany</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1ca0720d5ff0d873b075dcd7b4bbfe10f9d29aacf332a1f40076c0472787c09</i> (ID: 31662)<br /><br />Target victim <b>website</b>: <i>heinrichs-logistic.de</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>merlo.de</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31661</link>
<guid>c227f70597a4381bfb7e18a535028faa</guid>
<id>31661</id>
<pubDate>Sun, 26 Apr 2026 09:54:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>merlo.de</b>. The target comes from <b>Germany</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>db1da7f6512935da59e8184c6be0c064f5d314afb87f2b08f2ffae34778c690f</i> (ID: 31661)<br /><br />Target victim <b>website</b>: <i>merlo.de</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>CHECKMARX</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31660</link>
<guid>d279b7b85cdc6930ed48a94c79f7a92d</guid>
<id>31660</id>
<pubDate>Sat, 25 Apr 2026 21:11:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lapsus$</b> claims attack for <b>CHECKMARX</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a90be54023228a5102bed05400e6d88166bd2511a3ba6e94156dfeea16381e3</i> (ID: 31660)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lapsus$</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chase Cooper Limited (RiskLogix Solutions)</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31658</link>
<guid>29aaf96073ec131b599f9b6cee22199e</guid>
<id>31658</id>
<pubDate>Sat, 25 Apr 2026 16:56:18 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Chase Cooper Limited (RiskLogix Solutions)</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9320c7525ecc64a1fde74748942303c1fb2a43df9352b2f01655ddf714beb0b6</i> (ID: 31658)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Apple Film Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31659</link>
<guid>d9ff19fd45832606232d6003462b96b5</guid>
<id>31659</id>
<pubDate>Sat, 25 Apr 2026 16:42:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lamashtu</b> claims attack for <b>Apple Film Group</b>. The target comes from <b>Thailand</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a967c18f54325e1f5adfc6cfe90cb6d0ac52ef4da7e01dc5d3f22c5afd393a09</i> (ID: 31659)<br /><br />Target victim <b>website</b>: <i>applefilm-group.com</i>]]></description>
<category>lamashtu</category>
</item>
<item xmlns:dc='ns:1'>
<title>LA Woodworks</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31644</link>
<guid>1441f32b14b8433d109f166d7668c4ce</guid>
<id>31644</id>
<pubDate>Sat, 25 Apr 2026 15:56:16 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>LA Woodworks</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b1dd89dc7ddf93705b85973d9f82dcf255f3f3ef5ca32fc3f6921fd159d82290</i> (ID: 31644)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Buckley Powder</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31645</link>
<guid>4ebcff140cef36926eddf245293c8f5b</guid>
<id>31645</id>
<pubDate>Sat, 25 Apr 2026 15:56:15 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Buckley Powder</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fa6444cdd2741b17fd402ba8c0eec7a1ac54cc0141ccaacd92c855f5dab99908</i> (ID: 31645)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cahbo Produkter</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31646</link>
<guid>a7be1228195896ae985f9c015fbe7af8</guid>
<id>31646</id>
<pubDate>Sat, 25 Apr 2026 15:56:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Cahbo Produkter</b>. The target comes from <b>Sweden</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c44ea0692731d43385134cfbbffaae79ab4da6aa34563b1d90f48d833669292</i> (ID: 31646)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Leistritz Turbine Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31647</link>
<guid>5cd2239c3df67e56db22342d046579c1</guid>
<id>31647</id>
<pubDate>Sat, 25 Apr 2026 15:56:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Leistritz Turbine Technology</b>. The target comes from <b>Germany</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f390396c3c0b96e5f2f3119a8e58da81aff21a51d9ae7adb744d7fc7d1c33456</i> (ID: 31647)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dillon Family Medicine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31648</link>
<guid>d54c1acef541c844cc5d47d6a25cb029</guid>
<id>31648</id>
<pubDate>Sat, 25 Apr 2026 14:57:17 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Dillon Family Medicine</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6495c0558f8baedf9f53f8faa78f2e40e36bc560b6068412bdee7ef347c37683</i> (ID: 31648)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>KEMBA Indianapolis Credit Union</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31657</link>
<guid>42bf85e14dc95c0ad727255443108b73</guid>
<id>31657</id>
<pubDate>Sat, 25 Apr 2026 14:47:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>KEMBA Indianapolis Credit Union</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7a29bb8de9fc322dbf08a29eb616a65cfcaf16d083970680a5d6e8ab6e9e8d47</i> (ID: 31657)<br /><br />Target victim <b>website</b>: <i>www.mykemba.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>SanCor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31656</link>
<guid>2b9546fb885c5aa3a7802f895f56fe20</guid>
<id>31656</id>
<pubDate>Sat, 25 Apr 2026 14:47:30 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>SanCor</b>. The target comes from <b>Argentina</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c0760fd2bda2e65f0640afc55b8af6a172a0b9b73f540f64c1a5fb5884213bd</i> (ID: 31656)<br /><br />Target victim <b>website</b>: <i>www.sancor.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>First County FCU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31655</link>
<guid>0f09698017af107026ad0b0be011fa73</guid>
<id>31655</id>
<pubDate>Sat, 25 Apr 2026 14:47:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>First County FCU</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ce79e2d35da18769c71e5727c3bf35dde12066b7c7641a6afa81ff58c7c6cd8</i> (ID: 31655)<br /><br />Target victim <b>website</b>: <i>www.firstcountyfcu.org</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chelten House</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31654</link>
<guid>26079c271736e881b2c523644f8de690</guid>
<id>31654</id>
<pubDate>Sat, 25 Apr 2026 14:46:54 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Chelten House</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>83df1290a01f680f0c5954242b051437f85b6d6f2a1edede13760e0b32a308cb</i> (ID: 31654)<br /><br />Target victim <b>website</b>: <i>www.cheltenhouse.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woodfields Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31653</link>
<guid>c3517db938a70f36f4e73cb9b0eb8f76</guid>
<id>31653</id>
<pubDate>Sat, 25 Apr 2026 14:46:37 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Woodfields Consultants</b>. The target comes from <b>Philippines</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c88faaf5b17656f884e03641cd9921bce668c7ba79c6cad94fbea523197327c3</i> (ID: 31653)<br /><br />Target victim <b>website</b>: <i>www.wci.com.ph</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Travel Expert</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31652</link>
<guid>38b12ca2da2197746dd5ae6549648310</guid>
<id>31652</id>
<pubDate>Sat, 25 Apr 2026 14:46:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Travel Expert</b>. The target comes from <b>Hong Kong</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c9f48bdd63ae95d6c911c5a24c8c0f589bfe78d421ac3df0d843bb9cd3828808</i> (ID: 31652)<br /><br />Target victim <b>website</b>: <i>www.travelexpert.com.hk</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mid Florida Dermatology &amp; Plastic Surgery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31651</link>
<guid>7829e6d847f0b9d897d940aa3f3b7b46</guid>
<id>31651</id>
<pubDate>Sat, 25 Apr 2026 14:45:59 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Mid Florida Dermatology &amp; Plastic Surgery</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7997f25789c5c1835c15781cd1a369d83867e0710aa79ca68075f95b96e74ea2</i> (ID: 31651)<br /><br />Target victim <b>website</b>: <i>www.midflmed.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Swansea Ambulance Corps</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31650</link>
<guid>05205552655b321c2b5eb6c76daeea63</guid>
<id>31650</id>
<pubDate>Sat, 25 Apr 2026 13:35:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Swansea Ambulance Corps</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>32e2f8f6dfab8ff4faa88ba4aff45c1b958bd5889f555bd497b4169ee76d823f</i> (ID: 31650)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>The **u***y C*** o* **r**n</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31649</link>
<guid>d2c5e56957e442851dfb4dd0236a8d85</guid>
<id>31649</id>
<pubDate>Sat, 25 Apr 2026 13:35:10 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>The **u***y C*** o* **r**n</b>. The target comes from <b>Non Disponibile</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aea36b402231d1ae6cb7214bc9498b87fa9df2d742e32aa36afb4ecac4ad5676</i> (ID: 31649)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Malaysian NPK Fertilizer Sdn. Bhd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31643</link>
<guid>f0c19e4e1cbcc224b862bb4579a06a7e</guid>
<id>31643</id>
<pubDate>Sat, 25 Apr 2026 10:35:51 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>lamashtu</b> claims attack for <b>Malaysian NPK Fertilizer Sdn. Bhd</b>. The target comes from <b>Malaysia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7cbbd780f374717a3b4f57070c6f39bdb05f78f8cbe30960dfb52b110447da04</i> (ID: 31643)<br /><br />Target victim <b>website</b>: <i>mnfsb.com.my</i>]]></description>
<category>lamashtu</category>
</item>
<item xmlns:dc='ns:1'>
<title>krauseundco</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31642</link>
<guid>ddf26bf6c716f9ad2d1b05a321e4b5b8</guid>
<id>31642</id>
<pubDate>Sat, 25 Apr 2026 00:04:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>krauseundco</b>. The target comes from <b>Germany</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2cb0b87e2bc05a21e5804d29a36d6a301d1500378e5992f5ae627846aebff44c</i> (ID: 31642)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Point Four EPoS Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31635</link>
<guid>1915f6556ef3ac2c9fd7fef0d0bbba3f</guid>
<id>31635</id>
<pubDate>Fri, 24 Apr 2026 19:56:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Point Four EPoS Solutions</b>. The target comes from <b>UK</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5abbbaac988f4a08d6a663c7c58a016d5113ddbb697171dc017524c3d0249487</i> (ID: 31635)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Denso</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31636</link>
<guid>d44836f6af3750d0a10bff027133bb73</guid>
<id>31636</id>
<pubDate>Fri, 24 Apr 2026 19:56:40 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Denso</b>. The target comes from <b>Japan</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2c225a8bbaddc9e73ee018e1384022043cdc36d45d1cc3b6403d81926333e568</i> (ID: 31636)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Marc Cain</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31637</link>
<guid>6d2bb9eb2c15945e521e74f65e846d1d</guid>
<id>31637</id>
<pubDate>Fri, 24 Apr 2026 19:56:39 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Marc Cain</b>. The target comes from <b>Germany</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dbb1928d7f429348f044496115138e5c4a454bd1d3f8b6640eda3417c04bfd58</i> (ID: 31637)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Progressive Propane</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31638</link>
<guid>3ad980cc442688dcd2cb1052725e2683</guid>
<id>31638</id>
<pubDate>Fri, 24 Apr 2026 19:56:38 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Progressive Propane</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0101e93b8b91997919d7d90e36962e3cb4ae9176f81ec9af73953729f83952ab</i> (ID: 31638)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Priests for Life</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31639</link>
<guid>66f870cbf6b7ef5d6d1c8a3d4671e775</guid>
<id>31639</id>
<pubDate>Fri, 24 Apr 2026 18:56:21 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Priests for Life</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49649700e681ef44f2253d993b93da27ae62df2921be91bcfb8d2b9efddfb682</i> (ID: 31639)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Flipo Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31640</link>
<guid>00b0b4deb1406b3141a6de7c3950a424</guid>
<id>31640</id>
<pubDate>Fri, 24 Apr 2026 18:56:20 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Flipo Group</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>22c5cecbb6a880ab5348518d959761b82fb55364438dd33dd2410ea6fb6251ee</i> (ID: 31640)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grupo ABC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31641</link>
<guid>02f0e6a7fa6ad9f53391a17e80335e49</guid>
<id>31641</id>
<pubDate>Fri, 24 Apr 2026 18:56:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Grupo ABC</b>. The target comes from <b>Mexico</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8423b6491bc2625def513c9bd4e5f6ca2bf9874ed30e216850f61ca52115689</i> (ID: 31641)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>METO Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31634</link>
<guid>d01d080783ec584fbcdeda594b17b442</guid>
<id>31634</id>
<pubDate>Fri, 24 Apr 2026 15:11:44 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>METO Systems</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee1d96a796c729a7c3b847321a00976a9f05140b217cd1705f8e6a50aef39f7b</i> (ID: 31634)<br /><br />Target victim <b>website</b>: <i>www.metosystems.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>tlctrialteam.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31633</link>
<guid>0dd552b30e0889e7fffcc386e3508484</guid>
<id>31633</id>
<pubDate>Fri, 24 Apr 2026 15:08:14 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>tlctrialteam.com</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c08e26a93cbe3406fc36ea779ce25b2e6580d6b6dc9853cc0b151714a1c51792</i> (ID: 31633)<br /><br />Target victim <b>website</b>: <i>tlctrialteam.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rockville Fuel &amp; Feed</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31632</link>
<guid>a2ee868039973701dbacf41a3c5af4ba</guid>
<id>31632</id>
<pubDate>Fri, 24 Apr 2026 13:28:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Rockville Fuel &amp; Feed</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c60d681826565b4a172a3a6b3b75bf5c070cace44405823489ba355480d853d1</i> (ID: 31632)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Star Energy Geothermal Salak</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31631</link>
<guid>17e7db7285aca2e1ccc7bdf1b106c8d9</guid>
<id>31631</id>
<pubDate>Fri, 24 Apr 2026 12:46:47 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Star Energy Geothermal Salak</b>. The target comes from <b>Indonesia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d692893e43f76ba3d809b88c02784b2f45a6eee9c1cc0f743ee4dd99b9f58a47</i> (ID: 31631)<br /><br />Target victim <b>website</b>: <i>www.starenergy.co.id</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Dorotea Sweden</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31630</link>
<guid>f2bd2dc4768de1aadf66b36c31e29e7c</guid>
<id>31630</id>
<pubDate>Fri, 24 Apr 2026 12:08:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Dorotea Sweden</b>. The target comes from <b>Sweden</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a5e40ddfd01befc47da46ef7565d4905b1f94c9da494503c1b81ac0001b3c104</i> (ID: 31630)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lessard Dental</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31629</link>
<guid>38d0de8f29a1326da65e1f48fa0474d5</guid>
<id>31629</id>
<pubDate>Fri, 24 Apr 2026 10:09:36 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Lessard Dental</b>. The target comes from <b>Canada</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>392e99c6887710a96b4f5d39f3064f93f9d57ba4b9fcbec11c163a0b3cad8eb6</i> (ID: 31629)<br /><br />Target victim <b>website</b>: <i>www.lessarddental.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Udemy, Inc. (udemy.com)</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31628</link>
<guid>6c982c9657a6661e773e6cc2b48250aa</guid>
<id>31628</id>
<pubDate>Fri, 24 Apr 2026 07:59:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Udemy, Inc. (udemy.com)</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d8709c54c32faadf2429bc74626f916d1c1e884d64978719b38e47d281ed5368</i> (ID: 31628)<br /><br />Target victim <b>website</b>: <i>udemy.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>ADT, Inc. (adt.com)</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31627</link>
<guid>8ecb8ebb08e20837963e95b2d8eded47</guid>
<id>31627</id>
<pubDate>Fri, 24 Apr 2026 07:58:41 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>ADT, Inc. (adt.com)</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>348a1e1684299b16bba7a05cb9ad54b132fa8caf1ab5b6b025de405a74316aa0</i> (ID: 31627)<br /><br />Target victim <b>website</b>: <i>adt.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Chartwell Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31626</link>
<guid>51e04cd4e55e7e415bf24de9e1b0f3ff</guid>
<id>31626</id>
<pubDate>Thu, 23 Apr 2026 20:18:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Chartwell Law</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48224849d44aebd7c385c3b8bccb95df39e13e011528e970fa8a92bc1c2a9bd7</i> (ID: 31626)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mother&#039;s Market &amp; Kitchen</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31625</link>
<guid>8ad2f16f1cfd0d6443a089c0624042b4</guid>
<id>31625</id>
<pubDate>Thu, 23 Apr 2026 20:18:19 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Mother&#039;s Market &amp; Kitchen</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d940c8190f04c138cf029fc83a35f0ab59eb3969b5adc30118caf07c946f6ef9</i> (ID: 31625)<br /><br />Target victim <b>website</b>: <i>mothersmarket.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>B to B Visions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31616</link>
<guid>fd982f3faf6faa7b8049fcb713afb2b7</guid>
<id>31616</id>
<pubDate>Thu, 23 Apr 2026 19:51:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>B to B Visions</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90b72bc2b7de5faf940b72c55f0b8f8535de98d57d7f6d99c23fc45ff3de47b3</i> (ID: 31616)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Manulife Wealth</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31617</link>
<guid>6597f708e3b4e2bfd2bbc97920d69e59</guid>
<id>31617</id>
<pubDate>Thu, 23 Apr 2026 19:51:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Manulife Wealth</b>. The target comes from <b>Canada</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97f1b074765757053a4241f9fad3c26df3f2a36f37d987464fd2e9b8c36e6a1f</i> (ID: 31617)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The FAFS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31618</link>
<guid>ec04a75ca6302d347df2f803efe8c5bd</guid>
<id>31618</id>
<pubDate>Thu, 23 Apr 2026 19:51:04 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The FAFS</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9e38127da1e69faa84bbcdb290921eced6c95c66e6a2e74e9542564c2b27ea7</i> (ID: 31618)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Clearview Intelligence</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31619</link>
<guid>6512943977de3daab2f86f70dff08061</guid>
<id>31619</id>
<pubDate>Thu, 23 Apr 2026 19:51:02 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Clearview Intelligence</b>. The target comes from <b>UK</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>297f5b03450e3cf38872a6376dd2309404bc5cd59c615fba30038076fba68212</i> (ID: 31619)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>City of Napoleon, Ohio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31624</link>
<guid>493c8b3821e768713a4d1c5b1e7f5ad4</guid>
<id>31624</id>
<pubDate>Thu, 23 Apr 2026 18:06:06 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>City of Napoleon, Ohio</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>297db35b92cfe762bbf6a189b5c983dc38e2bf5d0db9ad2de72023976ba9b2a5</i> (ID: 31624)<br /><br />Target victim <b>website</b>: <i>www.napoleonohio.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peroni Sosa Tellechea Burt &amp; Narvaja</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31623</link>
<guid>597a30669470a5825ac4655a8aeb8289</guid>
<id>31623</id>
<pubDate>Thu, 23 Apr 2026 18:05:05 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>Peroni Sosa Tellechea Burt &amp; Narvaja</b>. The target comes from <b>Paraguay</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>815f67f160fd4e0c76b5d82bfd5d87171f0262defeb7c560ff122c977aea8c47</i> (ID: 31623)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>meditron.com.ve</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31622</link>
<guid>e027ffbf4c1d80802a64ca25f39caa8d</guid>
<id>31622</id>
<pubDate>Thu, 23 Apr 2026 18:04:35 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>meditron.com.ve</b>. The target comes from <b>Venezuela</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c7cde36c9dede7d5acc63f8d911493682106e43cb2455b3386eee578962fb281</i> (ID: 31622)<br /><br />Target victim <b>website</b>: <i>meditron.com.ve</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>b3-bruck.at</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31621</link>
<guid>57c50209953cb4fb4c0e9b9631f3802c</guid>
<id>31621</id>
<pubDate>Thu, 23 Apr 2026 18:03:46 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>b3-bruck.at</b>. The target comes from <b>Austria</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2778f7643491fd26d92ffec8c4028b0c9925523e057a55cfba2008993f49fd1b</i> (ID: 31621)<br /><br />Target victim <b>website</b>: <i>b3-bruck.at</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>caravaningcity.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31620</link>
<guid>9436535c0d2f5b452cf260f63ca8157c</guid>
<id>31620</id>
<pubDate>Thu, 23 Apr 2026 18:02:57 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>caravaningcity.com</b>. The target comes from <b>Spain</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e59fe3be99c8461d32e7e750faa122546554c53116fe8c9b0dce6b1747be99c</i> (ID: 31620)<br /><br />Target victim <b>website</b>: <i>caravaningcity.com</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>Alkegen</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31615</link>
<guid>3a68abc388606a36771c8c8b8bf64129</guid>
<id>31615</id>
<pubDate>Thu, 23 Apr 2026 15:57:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Alkegen</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>09a5f6c2fe3a68c10f6809f5cd9d3dbf925335683ee2e4d1bc51c094824b1c3d</i> (ID: 31615)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>1st Solution CTC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31613</link>
<guid>de26c8e50deca7dbd638148d8799ce74</guid>
<id>31613</id>
<pubDate>Thu, 23 Apr 2026 15:37:33 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>bravox</b> claims attack for <b>1st Solution CTC</b>. The target comes from <b>Germany</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>46003500b368d405f476cba498f7b2c34b9619efb313e39977cf1dab447cdc48</i> (ID: 31613)<br /><br />Target victim <b>website</b>: <i>www.1sctc.com</i>]]></description>
<category>bravox</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gumpp Kunststoffe</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31612</link>
<guid>413f2dc2067072c4339624db3d9fa537</guid>
<id>31612</id>
<pubDate>Thu, 23 Apr 2026 14:27:32 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Gumpp Kunststoffe</b>. The target comes from <b>Germany</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a2808d24fc16c193656ce23bd803967a6f5233f260a77b733c04e9d119e09d98</i> (ID: 31612)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Virginia Health Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31611</link>
<guid>30de3848a3d427de6774066e0b9b09bc</guid>
<id>31611</id>
<pubDate>Thu, 23 Apr 2026 12:53:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Virginia Health Services</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>916d0c5fdb21f42deec278f80597a87b21f69a28eaa44b3be9b286ba994d9e7e</i> (ID: 31611)<br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kementerian Pertanian</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31610</link>
<guid>729fbaf01455353285fd43871be6ebb7</guid>
<id>31610</id>
<pubDate>Thu, 23 Apr 2026 09:58:26 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Kementerian Pertanian</b>. The target comes from <b>Indonesia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6aee8c82ef0999b612bbbda99e162cf7e6e4a27732505a686c775d256a26155d</i> (ID: 31610)<br /><br />Target victim <b>website</b>: <i>pertanian.go.id</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sea Telecom Br</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31609</link>
<guid>c3ad4331d5fac2ce23e520b0cc0fcb5e</guid>
<id>31609</id>
<pubDate>Thu, 23 Apr 2026 09:57:49 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Sea Telecom Br</b>. The target comes from <b>Brazil</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>575c3f8595bb549abb045e1f03670ddcfb0971760b1c04bd9a8a344f25392612</i> (ID: 31609)<br /><br />Target victim <b>website</b>: <i>seatelecom.com.br</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Precision Coating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31608</link>
<guid>4f2bed48f31aa4f70b89c5e87a60e3e9</guid>
<id>31608</id>
<pubDate>Thu, 23 Apr 2026 09:57:13 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Precision Coating</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f09e86b13e15fcf4401b5cd6535489e6d0f42ea366c2502ea93574e16cb86449</i> (ID: 31608)<br /><br />Target victim <b>website</b>: <i>precisioncoating.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Integer Holdings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31607</link>
<guid>a71f9f47d27e10623154025319152a82</guid>
<id>31607</id>
<pubDate>Thu, 23 Apr 2026 09:56:29 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Integer Holdings</b>. The target comes from <b>USA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c5861980b43c9589f07070fa0b0984f4c68cee4a0601eba3ab3cea926bb6a4e0</i> (ID: 31607)<br /><br />Target victim <b>website</b>: <i>integer.net</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sanna Web</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31606</link>
<guid>5e07ccf98e67363bad70138b84cfe2cb</guid>
<id>31606</id>
<pubDate>Thu, 23 Apr 2026 09:56:11 CEST</pubDate>
<dc:creator>RansomFeed</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Sanna Web</b>. The target comes from <b>Peru</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-COMPLETE-PUBLIC" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6fcc0e6074e21748be39ffafa68eb0d251437e503a79f979bb15310b29b227f</i> (ID: 31606)<br /><br />Target victim <b>website</b>: <i>sanna.pe</i>]]></description>
<category>coinbasecartel</category>
</item>
</channel>
</rss>
