<?xml version='1.0' encoding='UTF-8' ?>
<rss version='2.0'>
<channel>
<title>Ransom Feed | RSS</title>
<link>https://ransomfeed.it/</link>
<description>Ransomware victims RSS <img referrerpolicy="no-referrer-when-downgrade" src="https://matomo.ransomfeed.it/matomo.php?idsite=1&amp;rec=1" style="border:0" alt="" /></description>
<language>en-us</language>
<item xmlns:dc='ns:1'>
<title>Beyond-Measure--Associates-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31908</link>
<guid>28ca2a3ef786a75109a9e2af23c1a4f7</guid>
<pubDate>Sat, 02 May 2026 10:25:34 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Beyond-Measure--Associates-Inc.</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38999af7eaaf6b3ddb3d8ec9a189854da82770fd4690e973eaeedbb11ceda7aa</i><br /><br />Target victim <b>website</b>: <i>churchdesign.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>JG-Stewart-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31907</link>
<guid>93c6c0bd09a280606df12f66752d7b76</guid>
<pubDate>Sat, 02 May 2026 10:21:06 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>cmdorganization</b> claims attack for <b>JG-Stewart-Construction</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f6bd42e5243c7a6832c0797ee27f740049840ce1113a931324ae938d2420b54c</i><br /><br />Target victim <b>website</b>: <i>www.jgstewart.ca</i>]]></description>
<category>cmdorganization</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cytek-Biosciences</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31906</link>
<guid>6107f0a7614917c3c78a74ebe45f00ca</guid>
<pubDate>Sat, 02 May 2026 08:54:08 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>cmdorganization</b> claims attack for <b>Cytek-Biosciences</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28ab2589fe35d1fbc61c189db44d9d735608081848ffbdd6e0dc6b346c33dd67</i><br /><br />Target victim <b>website</b>: <i>cytekbio.com</i>]]></description>
<category>cmdorganization</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zampell</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31905</link>
<guid>bd41a065d4640c9dd3c1e06ce9c820dc</guid>
<pubDate>Sat, 02 May 2026 08:53:32 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>cmdorganization</b> claims attack for <b>Zampell</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>418b112f15b9de980fdb4df925b78ba74d699ee4ac55f0a270bd062ff1b776da</i><br /><br />Target victim <b>website</b>: <i>www.zampell.com</i>]]></description>
<category>cmdorganization</category>
</item>
<item xmlns:dc='ns:1'>
<title>Minidoka-Memorial-Hospital</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31904</link>
<guid>42aa61c7ccfa95dc4db4d894530def8a</guid>
<pubDate>Sat, 02 May 2026 08:48:22 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>blackwater</b> claims attack for <b>Minidoka-Memorial-Hospital</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1fe9e3e2506542d2e36ce2fab2aff99541c7b04fe34a505a2ebc675378e6d57f</i><br /><br />Target victim <b>website</b>: <i>minidokamemorial.org</i>]]></description>
<category>blackwater</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grupo-EBD</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31903</link>
<guid>3cfdef4f1447147029268a257d131552</guid>
<pubDate>Sat, 02 May 2026 08:48:07 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>blackwater</b> claims attack for <b>Grupo-EBD</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cba3d4408cd0e1b6b327a239e59ef3aa9bb3d30e0a273f185d974857681c28a5</i><br /><br />Target victim <b>website</b>: <i>ebdgrupo.com.br</i>]]></description>
<category>blackwater</category>
</item>
<item xmlns:dc='ns:1'>
<title>Shenzhen-Gongjin-Electronics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31902</link>
<guid>24c301e049a2077855d3e37ba719b09d</guid>
<pubDate>Sat, 02 May 2026 08:47:54 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>blackwater</b> claims attack for <b>Shenzhen-Gongjin-Electronics</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a22b7adedeb88584a386cd3d0d578705d6e59915dc355d6cb3f215b178eb065</i><br /><br />Target victim <b>website</b>: <i>twsz.com</i>]]></description>
<category>blackwater</category>
</item>
<item xmlns:dc='ns:1'>
<title>Compass-Housing-Alliance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31901</link>
<guid>ea2486be22140cf8214932e344a07215</guid>
<pubDate>Sat, 02 May 2026 08:47:41 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>blackwater</b> claims attack for <b>Compass-Housing-Alliance</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cf393b14dda1c93dc4e4aea96b3ce3c9ee4fff60147821bb82cce9954eb80cd7</i><br /><br />Target victim <b>website</b>: <i>compasshousingalliance.org</i>]]></description>
<category>blackwater</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tuopu</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31900</link>
<guid>2d900e04fb7fe731dd78384d431be953</guid>
<pubDate>Sat, 02 May 2026 08:47:28 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>blackwater</b> claims attack for <b>Tuopu</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d8338db72d012fb7af5b09bf2cf92766777875f41b48fdf89792121546c024f</i><br /><br />Target victim <b>website</b>: <i>tuopu.com</i>]]></description>
<category>blackwater</category>
</item>
<item xmlns:dc='ns:1'>
<title>arc-reins.com--fidelityunited.ae</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31899</link>
<guid>273a634ff7ef3901439b31356661d9a2</guid>
<pubDate>Sat, 02 May 2026 08:23:31 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>arc-reins.com--fidelityunited.ae</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>330bfc8b38886fc292fb66a00be55179d65cf6a761e8c6d1ebb68b5a5c383964</i><br /><br />Target victim <b>website</b>: <i>fidelityunited.ae</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>A-F-Plas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31898</link>
<guid>45dd9ad828c84b23362897d255847915</guid>
<pubDate>Sat, 02 May 2026 06:54:43 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>A-F-Plas</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4fce6a9850c49076cc1e5657076615f1a08924a0d9152ddd01ac2d4e2c606430</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Site-Design-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31897</link>
<guid>14b14c86550a0d4c618b4764e11d49db</guid>
<pubDate>Sat, 02 May 2026 06:50:05 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Site-Design-Group</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ebf53247d6caf9201524e06ea4ccdee5162d4dcfafa7d5e930f59bad1fa3390</i><br /><br />Target victim <b>website</b>: <i>site-design.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Symcor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31896</link>
<guid>9cb3bc4bfbf9d8305833b25630f759a0</guid>
<pubDate>Sat, 02 May 2026 03:54:41 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Symcor</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cab3f6cefe3861f5a4d3a2177ea795f4feb4a6b034fc8348971d99741fa34f01</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>TSYS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31895</link>
<guid>4bbc7449ca4ad63ba9e6094180cc65cb</guid>
<pubDate>Sat, 02 May 2026 03:54:24 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>TSYS</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc311e3c26faf3e61b140466ba62614ba979c6ebab2937452b05d78492908549</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Epiq-Global</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31894</link>
<guid>ca50333df78f2f7bd42ac688af0af3e9</guid>
<pubDate>Sat, 02 May 2026 03:54:06 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Epiq-Global</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ffe7daa39e26de8aa1a6703c62018e1014bfed361c7a10b97573a8024558bd50</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>northshoreenv.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31893</link>
<guid>67a5bfdf2c0a67f87eb46b3e9a4a7a38</guid>
<pubDate>Sat, 02 May 2026 00:23:41 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>northshoreenv.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c7f6bffa81382f316eb880df9a1cd4f8c0f43cada7153389e42f912fd6e34aa</i><br /><br />Target victim <b>website</b>: <i>northshoreenv.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>energyaction.com.au</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31892</link>
<guid>7a07e25c31bd0a52a38e1f799d3fc004</guid>
<pubDate>Fri, 01 May 2026 21:24:35 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>energyaction.com.au</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>942caf3de249f905fb745b41b1e943b9f9965f9562daff3ffdf5d518963f2452</i><br /><br />Target victim <b>website</b>: <i>energyaction.com.au</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>hpk.hamburg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31891</link>
<guid>89ff20dc7d31ba2e1f0d4a99089bc3f6</guid>
<pubDate>Fri, 01 May 2026 21:24:20 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>hpk.hamburg</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af5875bfbb15ffd5d195475a8c52e2abfc28347e043f886bd30bb967726c48fa</i><br /><br />Target victim <b>website</b>: <i>hpk.hamburg</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>bomuhospital.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31890</link>
<guid>b6cce1d2ea012409f22932d7e11c396e</guid>
<pubDate>Fri, 01 May 2026 17:23:06 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>krybit</b> claims attack for <b>bomuhospital.org</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79c58ad78c1068ab046b4381d1d5d7dbd45c1817745efe55b29b6ef2d10fc542</i><br /><br />Target victim <b>website</b>: <i>bomuhospital.org</i>]]></description>
<category>krybit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Avnet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31889</link>
<guid>6cea18e92877f11b15280b17416ac030</guid>
<pubDate>Fri, 01 May 2026 17:13:00 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Avnet</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1a7d58cea1b86edafb7ef73a38424936d49130048695dd191e7598a5af47c369</i><br /><br />Target victim <b>website</b>: <i>avnet.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lena-Health</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31888</link>
<guid>01e651518630062d985188c1f0dbd83a</guid>
<pubDate>Fri, 01 May 2026 17:11:53 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Lena-Health</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79eeff4e9e0427c4444776f179f3695e90d23c6813590cf90708c6ee9ee0489e</i><br /><br />Target victim <b>website</b>: <i>lena.io</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Woundtech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31887</link>
<guid>3445ee86ba8817378a8577a75444f5d7</guid>
<pubDate>Fri, 01 May 2026 17:11:24 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Woundtech</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7fc042efd10e2b20c05462be84130d884410d599e325c58e1696e355f063d187</i><br /><br />Target victim <b>website</b>: <i>woundtech.net</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>youX--Drive-IQ</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31886</link>
<guid>0ccdcb33f85df88037bd0701b351d5df</guid>
<pubDate>Fri, 01 May 2026 17:10:19 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>youX--Drive-IQ</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e47d0e7b3ad28c22acf36f4893d96b76a35cc5cfe70ff9996d853bfa2c6731d4</i><br /><br />Target victim <b>website</b>: <i>youxpowered.com.au</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>LexisNexis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31885</link>
<guid>6b1e4ccdd469e7c0f4411a468b7910f7</guid>
<pubDate>Fri, 01 May 2026 17:09:12 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>LexisNexis</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e5c6bdb75054a1eb47d6331077ccf4b301dc8e8200e1ab8ec56f6434727e2c45</i><br /><br />Target victim <b>website</b>: <i>lexisnexis.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>MCO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31884</link>
<guid>2f2025ae2e57e71843298d80bed5cfde</guid>
<pubDate>Fri, 01 May 2026 17:08:05 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>MCO</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e738266b452f0aaa092e213583ba33927a5f83d6d3c427180c7139d26cf6302f</i><br /><br />Target victim <b>website</b>: <i>mycomplianceoffice.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>ReFocus-AI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31883</link>
<guid>a100e66d10d9f367ba4dcc5917657159</guid>
<pubDate>Fri, 01 May 2026 17:06:59 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>ReFocus-AI</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a8eefef75047dd351df76b75749851c214a81368503fac5df95e8dddb5f6db58</i><br /><br />Target victim <b>website</b>: <i>refocusai.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hatica</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31882</link>
<guid>60b4471e1fb1e8e0d266d97071669ccb</guid>
<pubDate>Fri, 01 May 2026 17:06:29 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Hatica</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90ddb7cb5d113094d1dc418569a2512ee894687a07ba7d18c6ca43a2db7d28fe</i><br /><br />Target victim <b>website</b>: <i>hatica.io</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Analog-Gold--Prospector</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31881</link>
<guid>ff40b691c06418347e31890b6fc1e29f</guid>
<pubDate>Fri, 01 May 2026 17:05:58 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Analog-Gold--Prospector</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b56741ea977be31cfe4aae73d7ec85021c6a13c82e955daacbb06b4008ec3541</i><br /><br />Target victim <b>website</b>: <i>analogau.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>SMTA-Sherwood-Mutual-Telephone-Association</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31865</link>
<guid>c4211b6fddf7ddf821087989ae514550</guid>
<pubDate>Fri, 01 May 2026 16:56:40 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>SMTA-Sherwood-Mutual-Telephone-Association</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4899e4e4b60b8924c44898f6ad163ab84b75ebc611e3873621a328a5ad6d0003</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ceywater-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31866</link>
<guid>a790b04a0380999fb3ea958c0e6eb5dc</guid>
<pubDate>Fri, 01 May 2026 16:56:39 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Ceywater-Consultants</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b78997833c9323fcfa9680be2e49da026460857f571c7a09516bf6dae0073f37</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peyton-Law-Firm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31867</link>
<guid>a65b920e6ce1070509a476e3b48aa56f</guid>
<pubDate>Fri, 01 May 2026 16:56:38 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Peyton-Law-Firm</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>307b5d6e823513cf12524b9b8b973ac24ba7369bdf34551b96a6ec665038a791</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Accurate-Nursing-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31868</link>
<guid>c732e4cb57268226f297e389d8382baf</guid>
<pubDate>Fri, 01 May 2026 16:56:34 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Accurate-Nursing-Services</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad27d4e0dc1c29493b39d9e717ee55cfd4b772199aace4eb6cd9fb9383161965</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nordstern-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31880</link>
<guid>c0b9b187cfd326a101efae8da2a1936e</guid>
<pubDate>Fri, 01 May 2026 16:51:31 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Nordstern-Technologies</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bc6dcc5170252c001306866d0f8ba41bcc5c174c42d299a50df8c26dc781ad29</i><br /><br />Target victim <b>website</b>: <i>nordsterntech.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>ParkEngage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31879</link>
<guid>b7c45703742d291cecb044204f548f8d</guid>
<pubDate>Fri, 01 May 2026 16:51:16 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>ParkEngage</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ae01a894fc8e58081b7f99bc46c9d56aa8e1d315d8efd7fd5d8c001a2744017</i><br /><br />Target victim <b>website</b>: <i>parkengage.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Saleskido</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31878</link>
<guid>9d57a1e06a731e1b2377de6781e881b1</guid>
<pubDate>Fri, 01 May 2026 16:50:59 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Saleskido</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75bf2ac57126b97479f200fa38ea149e5ca9aae70c800be8e230126462a6f49d</i><br /><br />Target victim <b>website</b>: <i>saleskido.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Interzero</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31877</link>
<guid>a6309e0c750850f2a5810fa35502875d</guid>
<pubDate>Fri, 01 May 2026 16:50:45 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Interzero</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c14f55f1c265574a686450c687da6e7b700da018681cc2f7d5223815c74fbfd</i><br /><br />Target victim <b>website</b>: <i>interzero.de</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>IMEVI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31876</link>
<guid>3695c15033a98875d655072649e59b27</guid>
<pubDate>Fri, 01 May 2026 16:50:29 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>IMEVI</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bca4ecbddbd1cebbef20e43a130cd444a25b70e3112286a7997df7b134beb3e1</i><br /><br />Target victim <b>website</b>: <i>imevi.com.co</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Raptor-Supplies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31875</link>
<guid>1348c8b3dfa9441929698fc2ae07594e</guid>
<pubDate>Fri, 01 May 2026 16:50:14 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Raptor-Supplies</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a07b29ab382541b288a37d55eb94d5823a761f1b3717a6eadcf10d467c0ef46</i><br /><br />Target victim <b>website</b>: <i>raptorsupplies.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Rotary-Club</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31874</link>
<guid>5708bc08150358bcab702024df5a1e0d</guid>
<pubDate>Fri, 01 May 2026 16:49:55 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Rotary-Club</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>97c95a3b47f2a39de6a54eae472375490b7d011acb0f455eac65a1df08783e12</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>JOT</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31873</link>
<guid>136097e96ea970878c91803a5394ab87</guid>
<pubDate>Fri, 01 May 2026 16:49:39 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>JOT</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65452874c7ba4e8b4ac95d66eba55513ab7746b1a928a8520ab22877c41fa986</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>BookBlock</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31872</link>
<guid>3ea0dca52330dfaa77e8a459cadd584c</guid>
<pubDate>Fri, 01 May 2026 16:49:24 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>BookBlock</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>589a473ecfedcda54246df263919b395cb07c7ec426bafb9d3ceef73a2fbf780</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Crank-Communications</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31871</link>
<guid>7269e7952aa48c4379151a29d01e25dd</guid>
<pubDate>Fri, 01 May 2026 16:49:08 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Crank-Communications</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>610b9cc2f056ab993d32d0af58e1de9ef5541b8d4e66ed2210514b216c3d12f9</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>CrediElite</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31870</link>
<guid>24c37633d32231fd6adf629b13a79ed4</guid>
<pubDate>Fri, 01 May 2026 16:48:54 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>CrediElite</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a659fb24bb4b01a69a5ec450ec2ec679efa7bc28e1351317fdcdcd68604af822</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fashinza</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31869</link>
<guid>c53efb25385f33b9aaddf6bbc3b8bc33</guid>
<pubDate>Fri, 01 May 2026 16:48:31 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>fulcrumsec</b> claims attack for <b>Fashinza</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce4692926e539e0af34e6ff900f0e99b1a386ab416090a1516216c1ead9cd8e1</i><br /><br />Target victim <b>website</b>: <i>fashinza.com</i>]]></description>
<category>fulcrumsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>Filter-to-A-F-Plas</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31864</link>
<guid>aa6d4debefaf1d03a69265997d8a8a6d</guid>
<pubDate>Fri, 01 May 2026 13:53:09 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Filter-to-A-F-Plas</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ec954953cfbf3eb0b37ce8e00c96931aef0c63fb822672863979980537705d7</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>wyomingcountyny.gov</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31863</link>
<guid>80a3f634893bdf5d63c679e5f99182b2</guid>
<pubDate>Fri, 01 May 2026 13:35:05 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>wyomingcountyny.gov</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfd06f35947645e8a0de536eb663cc47e6f8ac591d54db6822535eb8719e65e9</i><br /><br />Target victim <b>website</b>: <i>wyomingcountyny.gov</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>sequoiadental.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31862</link>
<guid>92699ee8e81849b1817a5d73d3bf8e02</guid>
<pubDate>Fri, 01 May 2026 13:34:50 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>sequoiadental.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c3fd9143086dd7a1706f67c09690322898c74222f72c0bff95fd77e8c5ed8040</i><br /><br />Target victim <b>website</b>: <i>sequoiadental.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>townofnorwell.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31861</link>
<guid>b96c50b7b132bacf5adba4adca9a4f10</guid>
<pubDate>Fri, 01 May 2026 13:34:35 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>townofnorwell.net</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>07dbee19aaf55fc29d13ee0f2646289506818c0a58d639eea1aceece1f14feb0</i><br /><br />Target victim <b>website</b>: <i>townofnorwell.net</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>curedentalbeltontx.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31860</link>
<guid>e8d0467189fccf2dff63796aa47202fc</guid>
<pubDate>Fri, 01 May 2026 13:34:20 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>curedentalbeltontx.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06256cdd024c13d5693a6fd2e3a0ee2352190da7757f2bf417b7f8a448538508</i><br /><br />Target victim <b>website</b>: <i>curedentalbeltontx.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>austinplasticandreconstructivesurgery.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31859</link>
<guid>4585ad1e2cbe41891c011a3e0e73e1d4</guid>
<pubDate>Fri, 01 May 2026 13:34:01 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>austinplasticandreconstructivesurgery.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3d910c2459a8293862b857af4bfed15d7c8ae2687818a9162b30333c84fbe3e0</i><br /><br />Target victim <b>website</b>: <i>austinplasticandreconstructivesurgery.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>hsjlawyers.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31858</link>
<guid>27adbf7fc9dd2c144f5cee93569fe2c1</guid>
<pubDate>Fri, 01 May 2026 13:33:46 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>hsjlawyers.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>aada07bd47a9a2f9067febda6a4fb50648968842f892fb5834ea778ac66e34c4</i><br /><br />Target victim <b>website</b>: <i>hsjlawyers.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>bun.nl</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31857</link>
<guid>1add70b0485ea554c1494f3bba0bc7b1</guid>
<pubDate>Fri, 01 May 2026 13:33:31 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>bun.nl</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96da7d0949710a407f2e92a3f1bcfa7dd820752cff76098b070062d56a7d7809</i><br /><br />Target victim <b>website</b>: <i>bun.nl</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>aceforwarding.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31856</link>
<guid>4397a09c4cb35e85a293b857c53c00ca</guid>
<pubDate>Fri, 01 May 2026 13:33:16 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>aceforwarding.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de9b30dead203b95d6876354ff73152708028ce39d9db9cbae3618ff0df7fcf2</i><br /><br />Target victim <b>website</b>: <i>aceforwarding.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>ic-controls.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31855</link>
<guid>3311dfa28d28e2198b54bbfa84495737</guid>
<pubDate>Fri, 01 May 2026 13:32:59 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>threeam</b> claims attack for <b>ic-controls.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6cae1ef99806125d6ecbcd3aef399c780ad7c564f3191d7c333df567a7dfec9e</i><br /><br />Target victim <b>website</b>: <i>ic-controls.com</i>]]></description>
<category>threeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Medical-PAY</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31854</link>
<guid>5732c8f48b699d91047d62ad16125a72</guid>
<pubDate>Fri, 01 May 2026 12:54:56 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>Medical-PAY</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45efd9c5b39f2f207d045c45892f861b4f529a080001bfd71e7a1c9d2481426a</i><br /><br />Target victim <b>website</b>: <i>medical-pay.jp</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>orekait.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31853</link>
<guid>412c7b6ababadf8670a78daa965204ba</guid>
<pubDate>Fri, 01 May 2026 12:46:34 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>orekait.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9488aacf1f2cdeed5bb0f46e86746b9e84f970d645dd0b42c8bd015da7637da</i><br /><br />Target victim <b>website</b>: <i>orekait.com</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>gursoygrup.com.tr</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31852</link>
<guid>9058ea5aa084f1c3475cd39bf83c1c9f</guid>
<pubDate>Fri, 01 May 2026 12:46:21 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>gursoygrup.com.tr</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd58a67554a2758f1e3432aed959fd3c26a8cc1e614990aa234aa0363d41cee5</i><br /><br />Target victim <b>website</b>: <i>gursoygrup.com.tr</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>irestal.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31851</link>
<guid>01508de355b3ac040610aa81f0e5b185</guid>
<pubDate>Fri, 01 May 2026 12:46:07 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>irestal.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c6c17c1627abb29d203ba9aa740b5781970040d9f63b660db71eb31d74103d7</i><br /><br />Target victim <b>website</b>: <i>irestal.com</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>ritta.co.th</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31850</link>
<guid>f04ffa2caf8acc39b74a8383c3213aa6</guid>
<pubDate>Fri, 01 May 2026 12:45:53 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>ritta.co.th</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e05afa1ba42e4ab6b56295c0b3e52933616564b23921924feea124237946da0f</i><br /><br />Target victim <b>website</b>: <i>ritta.co.th</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>Winona-County</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31849</link>
<guid>4021e2f19e21f8263b768cc19dd8ba70</guid>
<pubDate>Fri, 01 May 2026 10:51:49 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>interlock</b> claims attack for <b>Winona-County</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b319cc3acbbf9714f37d2ed786ab0e68b6ca68bf37223ec4a2d8cfbfc0de1a00</i><br /><br />Target victim <b>website</b>: <i>winonacounty.gov</i>]]></description>
<category>interlock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Roger-D.-Mason-II-P.A.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31848</link>
<guid>4882ab9f0909835c444fb6d4ce6d56f0</guid>
<pubDate>Fri, 01 May 2026 10:07:30 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Roger-D.-Mason-II-P.A.</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7c0d2990289740575ea75f58e7575e5825773e8cb51cdae040100011913ed3b5</i><br /><br />Target victim <b>website</b>: <i>flautolawyer.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kinsmen-TeleMiracle</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31847</link>
<guid>bad245e5c06461bfd1e49b4a03fcf441</guid>
<pubDate>Fri, 01 May 2026 10:07:07 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Kinsmen-TeleMiracle</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9902676a24edddb539097a914256f2acb7ffc79b42ff70e4ac29752d15716496</i><br /><br />Target victim <b>website</b>: <i>telemiracle.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mesquite-Plumbing-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31846</link>
<guid>0ac9a79e4aa15b44845b6b553cfcddbd</guid>
<pubDate>Fri, 01 May 2026 10:06:44 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Mesquite-Plumbing-Inc.</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27ac7e9c4d62915c881e6cc9613c5c28d702946e53b1bd7e9bf9606471de2967</i><br /><br />Target victim <b>website</b>: <i>mesquiteplumbing.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fox-Broermann-Pediatric-Dentistry-of-Tulsa</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31845</link>
<guid>a3ad705733dff104469abefd400c670c</guid>
<pubDate>Fri, 01 May 2026 10:06:21 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Fox-Broermann-Pediatric-Dentistry-of-Tulsa</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e33a2b6bc6a84114e27b02d059a97fb4e27e4dbe3bcefdd4197a70f661e3f68f</i><br /><br />Target victim <b>website</b>: <i>foxbroermann.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>flbgroup.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31844</link>
<guid>1a08d68b5124c82c0131d4e61c85dd8a</guid>
<pubDate>Fri, 01 May 2026 09:57:18 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>flbgroup.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cc528625ad9a1e2355325bc4c3732184158d0da117f7729cb805e7ff8e53eddc</i><br /><br />Target victim <b>website</b>: <i>flbgroup.com</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>kisnet.co.jp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31843</link>
<guid>18259e7b301ef18167860bedee2b191f</guid>
<pubDate>Fri, 01 May 2026 09:57:02 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>kisnet.co.jp</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c784d0980abf55a5bf66a6244963737c163cc044a01de4f8f38da6dd5b4d939a</i><br /><br />Target victim <b>website</b>: <i>kisnet.co.jp</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>nwlr.ca</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31842</link>
<guid>b93fb317f141266ca44bff72381a89b8</guid>
<pubDate>Fri, 01 May 2026 09:56:43 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>nwlr.ca</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2821db2cb2a14611443bf048b984471898e2092d114461c00addde4915bb3bff</i><br /><br />Target victim <b>website</b>: <i>nwlr.ca</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>liteline.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31841</link>
<guid>613a4e449485aeb4b09b3cc0702b6da8</guid>
<pubDate>Fri, 01 May 2026 09:56:29 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>liteline.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e8be89759530579440d93c26378ffa880f4b1f92c48f266b990da89d067dbdaa</i><br /><br />Target victim <b>website</b>: <i>liteline.com</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>westonconsulting.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31840</link>
<guid>30b1a01d3f62bf747f856235cc8bfb57</guid>
<pubDate>Fri, 01 May 2026 09:56:12 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>westonconsulting.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>20052c3b55a5c014081b225060603ce21dd652b98b899b158f516f21de8020b3</i><br /><br />Target victim <b>website</b>: <i>westonconsulting.com</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>exceldor.ca</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31839</link>
<guid>05a6cd7ec4ebca7b256ee86cefd9c488</guid>
<pubDate>Fri, 01 May 2026 09:55:56 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>exceldor.ca</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ccb06c0e8b5975aa3f8d197bf6e318f95a87acfb3cecda9e2bbec8546a9d76f</i><br /><br />Target victim <b>website</b>: <i>exceldor.ca</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>soundinsurance.ca</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31838</link>
<guid>34d9bc930a015793c49566b023b6ae9f</guid>
<pubDate>Fri, 01 May 2026 09:55:40 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>soundinsurance.ca</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a9ccdb70f9f3e4b19176acb61a3b1ae453991efd420d3b0befa68ffd20725c73</i><br /><br />Target victim <b>website</b>: <i>soundinsurance.ca</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>endeavourautomotive.co.uk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31837</link>
<guid>aebb462e657b9e288cbfe408fc1a9dd5</guid>
<pubDate>Fri, 01 May 2026 09:55:24 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>endeavourautomotive.co.uk</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb9074234b45b3f1d318abc6147c110cb310b6ac2c5dcc97196eb498a363484b</i><br /><br />Target victim <b>website</b>: <i>endeavourautomotive.co.uk</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>eworldme.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31836</link>
<guid>a0def054ef84ac2784ea52baee05d95f</guid>
<pubDate>Fri, 01 May 2026 09:55:08 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>eworldme.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e398db35fbedc13f28c9222d3cd8675fef3c2c2d2d19e1f3dc6fbcc637c19d01</i><br /><br />Target victim <b>website</b>: <i>eworldme.com</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>bridgeway-consulting.co.uk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31835</link>
<guid>5bf25b785406666d02272cf9cf0b9445</guid>
<pubDate>Fri, 01 May 2026 09:54:53 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>bridgeway-consulting.co.uk</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a76b6c6d0ed201fdea3be61d052055acf741304af8a25804f0ee2123b20b0def</i><br /><br />Target victim <b>website</b>: <i>bridgeway-consulting.co.uk</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Country-Club-of-Darien</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31834</link>
<guid>27230ac1c8d9d2828e1ff531bec85d37</guid>
<pubDate>Fri, 01 May 2026 09:51:32 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>The-Country-Club-of-Darien</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1066177cc8722c93920cc02c584ea43e64f8c84acce500888ab55396de3813f</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Colorado-Dental-Wellness-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31833</link>
<guid>0bff2aa05a6d99cad062133e6c589de1</guid>
<pubDate>Fri, 01 May 2026 01:21:24 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>anubis</b> claims attack for <b>Colorado-Dental-Wellness-Center</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>65d1ded481ce91f7affe0442a1faeee24b2e15ff001e48d88a5ad661f8410aae</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>anubis</category>
</item>
<item xmlns:dc='ns:1'>
<title>PROMOSFERA-S.R.l.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31832</link>
<guid>115bc51524f29ca721174801df38a2a8</guid>
<pubDate>Thu, 30 Apr 2026 23:19:29 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>blacknevas</b> claims attack for <b>PROMOSFERA-S.R.l.</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>53dd6a38bbb652c8b9fb351cfc57e7b578e91ef61245891cd50e199b983ccc06</i><br /><br />Target victim <b>website</b>: <i>promosfera.com</i>]]></description>
<category>blacknevas</category>
</item>
<item xmlns:dc='ns:1'>
<title>KINAS-SOLICITORS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31831</link>
<guid>b8df2222fc55ee587a2efd7b5577d91b</guid>
<pubDate>Thu, 30 Apr 2026 23:19:04 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>blacknevas</b> claims attack for <b>KINAS-SOLICITORS</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d83854236a418f71aee7fb886b82399f5bfa5a942b104aed81db41bf5feebe73</i><br /><br />Target victim <b>website</b>: <i>kinas.co.uk</i>]]></description>
<category>blacknevas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Paramount-Health-Services--Insurance-TPA-Pvt.-Ltd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31830</link>
<guid>444a6e426b16657ced4ab9e2308c1f97</guid>
<pubDate>Thu, 30 Apr 2026 23:18:41 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>blacknevas</b> claims attack for <b>Paramount-Health-Services--Insurance-TPA-Pvt.-Ltd</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ff0d8a56ccdf521ff43a31ac9824224edd570d763281e5e9adc3b17752872d57</i><br /><br />Target victim <b>website</b>: <i>paramounttpa.com</i>]]></description>
<category>blacknevas</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-company-MST-Sanko-Makina-and-ASKO-Holding</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31829</link>
<guid>f1a83118e2c5697f6679b2ce354e7f8d</guid>
<pubDate>Thu, 30 Apr 2026 23:18:19 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>blacknevas</b> claims attack for <b>The-company-MST-Sanko-Makina-and-ASKO-Holding</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac742ee94349adf00d3e2e470f3c15704896fb9235f39c9675ded53d3a290342</i><br /><br />Target victim <b>website</b>: <i>asko.com.tr</i>]]></description>
<category>blacknevas</category>
</item>
<item xmlns:dc='ns:1'>
<title>E-CON-Packaging-Private-Limited</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31828</link>
<guid>73eedb4032af35e2b57a3195bd433b2a</guid>
<pubDate>Thu, 30 Apr 2026 23:18:00 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>blacknevas</b> claims attack for <b>E-CON-Packaging-Private-Limited</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>744b20439b47a461b78a0b00ecf29aa6c39c6571bfff28d1ced551d220a29dbc</i><br /><br />Target victim <b>website</b>: <i>e-con.co</i>]]></description>
<category>blacknevas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Heng-An-Standard-Life-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31827</link>
<guid>663aa1f4a67d9cf37f2d4f7061e06769</guid>
<pubDate>Thu, 30 Apr 2026 23:17:11 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>blacknevas</b> claims attack for <b>Heng-An-Standard-Life-Insurance</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>58314094e9262157cd8dcfb40c1781fa1350fba7a402ec4974a8808248a90dfb</i><br /><br />Target victim <b>website</b>: <i>hengansl.com.hk</i>]]></description>
<category>blacknevas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carrera-Casting-Corp.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31826</link>
<guid>7e0a4d112e3f40b8f6decb2a7c365f91</guid>
<pubDate>Thu, 30 Apr 2026 23:11:47 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>blacknevas</b> claims attack for <b>Carrera-Casting-Corp.</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b6e2d9e56b94c2eb27f6433b71da36329c1f81a8fdb0e8fb619a3e1b971cc79</i><br /><br />Target victim <b>website</b>: <i>arreracasting.com</i>]]></description>
<category>blacknevas</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bohmler-Einrichtungshaus-GmbH</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31825</link>
<guid>d9f81c55a64eb1324cbe20c56cf59374</guid>
<pubDate>Thu, 30 Apr 2026 23:08:32 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>blacknevas</b> claims attack for <b>Bohmler-Einrichtungshaus-GmbH</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3fcf266202f3a4cf0d0b77e2e72a2a269c9b07ba472702b94abe0caff9974ace</i><br /><br />Target victim <b>website</b>: <i>boehmler.de</i>]]></description>
<category>blacknevas</category>
</item>
<item xmlns:dc='ns:1'>
<title>TOWERPOINT-WEALTH-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31824</link>
<guid>d4d9dd228996e12e46d286639eccd3e1</guid>
<pubDate>Thu, 30 Apr 2026 22:27:31 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>TOWERPOINT-WEALTH-LLC</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b71900e177cff797785d2603dc3828d3d5d3e1a306409e5594809f1067da264b</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Follett-Software-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31823</link>
<guid>3124f20ae7f8b97d325e86b1acfb7d3c</guid>
<pubDate>Thu, 30 Apr 2026 22:27:28 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Follett-Software-LLC</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>64e4f0510d2742a38c917c674f63c0b40a4b2579217b01d7dc51dba927187e4e</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>McKay</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31822</link>
<guid>63bb66d0a312a0cafdeaae6f1cba4578</guid>
<pubDate>Thu, 30 Apr 2026 21:50:35 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>mnt6</b> claims attack for <b>McKay</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18819017eb792fcd5ffd80690d8b4eb198ae15e22fc19a6f9f28d6171404f3df</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mnt6</category>
</item>
<item xmlns:dc='ns:1'>
<title>Silfab-Solar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31821</link>
<guid>239254e5edf816a9f88d5d514005a0d2</guid>
<pubDate>Thu, 30 Apr 2026 21:50:14 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>mnt6</b> claims attack for <b>Silfab-Solar</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>02b2ee2e92600748ea04a9f5c8776e40e3552314ec0856889b05e59fda09e97a</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>mnt6</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zinkan--Barker-Development</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31814</link>
<guid>6bbd49be0c3cea3467da28178487f9db</guid>
<pubDate>Thu, 30 Apr 2026 19:55:40 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Zinkan--Barker-Development</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52f360e9f8730041b56407ce85c90fd7723282a0d1243b071cc0163dfb49550d</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Apothebeauty</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31815</link>
<guid>c15e297925c4cff8760eead96426b961</guid>
<pubDate>Thu, 30 Apr 2026 19:55:39 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Apothebeauty</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9c67261ed4a227136ec07cdcdfd053c10719ca117ea64707e2dab5f98485ca88</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>MES-Hybrid-Document-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31816</link>
<guid>9b919c23d10644f99c0313a41316e90e</guid>
<pubDate>Thu, 30 Apr 2026 18:55:44 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>MES-Hybrid-Document-Systems</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>88eecf4d2379d7e0925a3f91b78208c7e2d6f04e13bdec48952fdf5c9331b7a6</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Switch-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31817</link>
<guid>f1ada790ce8f26ed12d4f2070b44bc81</guid>
<pubDate>Thu, 30 Apr 2026 18:55:43 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Switch-Enterprises</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3233062892bfb829be397fe36de263a9d83fede00c87369967e85a4985363bda</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sees-Candies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31818</link>
<guid>ba224f2bcea2cdd76611b651c3c78069</guid>
<pubDate>Thu, 30 Apr 2026 18:55:42 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Sees-Candies</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b2b48c2bba4841b4d837f042f2686d5f15e25f7326290eeebdd6ac5ac8660662</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jayeff-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31819</link>
<guid>a570d1a9488ae63742a5d82c946a44ea</guid>
<pubDate>Thu, 30 Apr 2026 18:55:41 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Jayeff-Construction</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3a95b5fde8f1e1e56a95b520eacdf9ea7ce1f0523ba42d837b34494c12929048</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Progressive-Oral-Surgery--Implantology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31820</link>
<guid>2c86a217e06d86e3db130723abd90fff</guid>
<pubDate>Thu, 30 Apr 2026 17:25:17 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Progressive-Oral-Surgery--Implantology</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a7fa85b45ea35f8a2b106d75f0cdd752bd91774aaa3c0fd3ef5f911650fdd15f</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Liberty-Mutual-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31813</link>
<guid>73618455b2f727ad8fe055241b6b06bd</guid>
<pubDate>Thu, 30 Apr 2026 16:53:12 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Liberty-Mutual-Insurance</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8792ff3392f7414251cf83a38060b6aa3d12a050170cd2912b23c66c2247fce9</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>weiss-pm.de</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31812</link>
<guid>3c476de2d92f9444b4f1859f43a4a48d</guid>
<pubDate>Thu, 30 Apr 2026 14:23:41 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>krybit</b> claims attack for <b>weiss-pm.de</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ccdf1c77802752b57bda0943adf8b8c2a6f40af5fef5b7a87261ac15af1ac64</i><br /><br />Target victim <b>website</b>: <i>weiss-pm.de</i>]]></description>
<category>krybit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bimtrazer</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31811</link>
<guid>a7ccec2053fd3f95bade291c40ae428c</guid>
<pubDate>Thu, 30 Apr 2026 13:57:00 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Bimtrazer</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a228d93355a6a1055b1eb4387df860f26541e9108fb897cca47b0a5c56f3f8bb</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>ATF-Aerospace</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31810</link>
<guid>a7d3154ed40d4dbebf306630991b11a7</guid>
<pubDate>Thu, 30 Apr 2026 13:50:46 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>ATF-Aerospace</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>52180d59e86bb9518f7d10cc472e3d531d8a1338b95156fb649b61cedc9cfb2b</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Abazia-SpA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31809</link>
<guid>f656f38a9dbf4d6727896f8e0dc5e73c</guid>
<pubDate>Thu, 30 Apr 2026 13:29:05 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Abazia-SpA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36506d2581b75daa09f6d9f56cfad2074b9efe6524b44fcc472368ed8363eceb</i><br /><br />Target victim <b>website</b>: <i>www.abazia.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Reschio</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31808</link>
<guid>93f52fc53bde4ada81365d7c2acb0735</guid>
<pubDate>Thu, 30 Apr 2026 11:26:20 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Reschio</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4596bb3aed4bd78fec14164ab0eb2e71dd0f359a7223aee7a1470ad3c97bc7d5</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Philex-Mining</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31807</link>
<guid>4eec603b40c78b0390abbd2bec778563</guid>
<pubDate>Thu, 30 Apr 2026 10:25:44 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Philex-Mining</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b44d780cb42fbad72b621f7d95b9e3f02d90497bbfe91637070e9eff730e434e</i><br /><br />Target victim <b>website</b>: <i>www.philexmining.com.ph</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jgb</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31806</link>
<guid>d89920adb1af2d681ea0df8a9f863a82</guid>
<pubDate>Thu, 30 Apr 2026 07:55:46 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Jgb</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>905f9ac08e27f3ac4cdc9974ec8575ddd7082157e266ebf02024d7732c2a97d7</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Morae</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31805</link>
<guid>a4cfa38878b278bbe2f6f5172474f86b</guid>
<pubDate>Thu, 30 Apr 2026 02:51:25 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Morae</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>767e1a1eaaf503d85590a3a1f3b049d980aafa9287a93b8cb2f8aaa9360e9311</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>Arban--Carosi</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31804</link>
<guid>70e57e78fd611128e6e6212c59c28b59</guid>
<pubDate>Thu, 30 Apr 2026 01:23:23 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Arban--Carosi</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0800798b74f1daebb348c4ffb75b00f5bfbb1923f689b1bf55e3ea9ec601b198</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Caunton-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31803</link>
<guid>922a7fd3b1c537453af87329140dcfb2</guid>
<pubDate>Thu, 30 Apr 2026 00:58:40 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Caunton-Engineering</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>33ae07df42348a908e959d94b1f8bd5fece05853b60d154eba022147b408ef3c</i><br /><br />Target victim <b>website</b>: <i>caunton.co.uk</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>V.-FRAAS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31802</link>
<guid>a306a13c6c1ee387390fdc96c7bdca66</guid>
<pubDate>Thu, 30 Apr 2026 00:58:12 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>V.-FRAAS</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b11018a07e829132c27965dea370a6213dfac10fe3ef604aec8b9ea89a8e9c3c</i><br /><br />Target victim <b>website</b>: <i>vfraas.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bespoke-Home-Interior-Design-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31801</link>
<guid>7dcf8773e0db912ac8a9bd8914aed99e</guid>
<pubDate>Thu, 30 Apr 2026 00:57:49 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Bespoke-Home-Interior-Design-Group</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d806b8feb1dd8abfc6d452e26a7aa5bfbc56748310ddb720608d779cbb80bc42</i><br /><br />Target victim <b>website</b>: <i>bhid.co.uk</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vortex-Companies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31800</link>
<guid>907426606e10139de6617963c3e73cff</guid>
<pubDate>Thu, 30 Apr 2026 00:57:23 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Vortex-Companies</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>059da878137e6ff54d6fe8f0fc1335e15aaa1a749aae287f990c05c3299e9482</i><br /><br />Target victim <b>website</b>: <i>vortexcompanies.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Telia-Norge-AS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31799</link>
<guid>7e1778994e19321c01d18786dc19e1f2</guid>
<pubDate>Thu, 30 Apr 2026 00:56:56 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Telia-Norge-AS</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>615cf0e89da1ca3ccfcf20c1279f805ce5c07ea977c2c230d52ae54f46cc4704</i><br /><br />Target victim <b>website</b>: <i>telia.no</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Prater-Engineering-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31798</link>
<guid>c035b218ddd4d6de439e5391d49cec73</guid>
<pubDate>Thu, 30 Apr 2026 00:56:29 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Prater-Engineering-Associates</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>85391a1029bcf18a07555d98d47ee499d0c1ee05af0e3d9369003b238b156422</i><br /><br />Target victim <b>website</b>: <i>praterengineering.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>ESENTIA-Energy-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31797</link>
<guid>f8ad8eaac9500143d39e20cb356df793</guid>
<pubDate>Thu, 30 Apr 2026 00:55:58 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>ESENTIA-Energy-Systems</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18b88c3cfed35b55ebfc95f01e4448f203498ae83a4d05a45e43b7d51697f69a</i><br /><br />Target victim <b>website</b>: <i>esentiaenergy.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Del-Monte-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31796</link>
<guid>45e7200bd1dbaf868c1b69de0dec23b9</guid>
<pubDate>Thu, 30 Apr 2026 00:55:27 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Del-Monte-Foods</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e90848fd2a8825a1b443d33a18b2f56701a37712e36174282c727fbd721b1916</i><br /><br />Target victim <b>website</b>: <i>delmontefoods.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>IG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31795</link>
<guid>de785fbd9c75be03fbd0dcc93a638fae</guid>
<pubDate>Thu, 30 Apr 2026 00:55:10 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>IG</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>38f65975dda16ba7f0867879b67bf553a928c91fbf38dbd8a8afe36b98ac4d91</i><br /><br />Target victim <b>website</b>: <i>im****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>OC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31794</link>
<guid>b9959873b3c9618749826c0f39ed7364</guid>
<pubDate>Thu, 30 Apr 2026 00:55:07 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>OC</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d962d7562ed049eb14bd69a7d39d055cf9a04914ee51cf7e5f4a3f50ae118bf</i><br /><br />Target victim <b>website</b>: <i>o****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>UFP-Technologies</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31793</link>
<guid>738d7deb467d69ea5d6c8aacb9613245</guid>
<pubDate>Thu, 30 Apr 2026 00:55:05 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>UFP-Technologies</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f8a7438d97261c9684a760724ced0f8c1716c3623a4558e81074b345bb337c3</i><br /><br />Target victim <b>website</b>: <i>ufpt.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31792</link>
<guid>c2ea9ab296477ed6346856f41c9aa5da</guid>
<pubDate>Thu, 30 Apr 2026 00:55:01 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Gs</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ae08618f58e8f39d1c61acf9cdb4557b9ba9846c4abdb72c4a997b1032bfb63</i><br /><br />Target victim <b>website</b>: <i>g****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eb</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31791</link>
<guid>5707abfe502cadf6688e68ddbae96060</guid>
<pubDate>Thu, 30 Apr 2026 00:54:57 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Eb</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>39f34ea89619e2f2d4480ddb2bf4d1c2e3e0e7648ef7650d81dc87c306e4dbfe</i><br /><br />Target victim <b>website</b>: <i>e****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Aero-Coating</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31790</link>
<guid>3b11e049d4d051954f4c8b742a2b306e</guid>
<pubDate>Thu, 30 Apr 2026 00:54:51 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Aero-Coating</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca55144bee5baee0804afd7bdeb6f5b0fecd71d2c3c07ad7bfe3161b04e5b9af</i><br /><br />Target victim <b>website</b>: <i>aero-coating.de</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Peachtree-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31789</link>
<guid>0493033a1c9575336529c17abf994b52</guid>
<pubDate>Thu, 30 Apr 2026 00:54:42 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Peachtree-Group</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed7077f735d647390d7329bcf355e9fe2c022aa9c4bc5612553fbbbe6bc26491</i><br /><br />Target victim <b>website</b>: <i>peachtreegroup.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ash--Lacy-Holdings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31788</link>
<guid>ba085ba9ace538a0e831ccfffb1265e6</guid>
<pubDate>Thu, 30 Apr 2026 00:53:53 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Ash--Lacy-Holdings</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2fac6ac8b06d3284bf4d572342242c4a04c325e84edfb6bd46f9de8cd3b60f84</i><br /><br />Target victim <b>website</b>: <i>ashandlacy.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Maderas-del-Alto-Urgel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31787</link>
<guid>ccfca21346c3478e872460bfaa0ba337</guid>
<pubDate>Thu, 30 Apr 2026 00:53:04 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Maderas-del-Alto-Urgel</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>606279c4316b6726db1ba5c56c6f897e380aafa3321bcc448cc83f259eb48c5e</i><br /><br />Target victim <b>website</b>: <i>mausa.es</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eyemart-Express</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31786</link>
<guid>499cb2ee42a8be29ad10e4afa28e0af8</guid>
<pubDate>Thu, 30 Apr 2026 00:42:27 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Eyemart-Express</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1e18a29cfd1e6d7851f18fc5b1bfba4491b3bfd84c435bc4cee8308ff706679</i><br /><br />Target victim <b>website</b>: <i>eyemartexpress.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sofinter-S.p.a</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31785</link>
<guid>8aff4d955cd8461e94156de3c712b712</guid>
<pubDate>Thu, 30 Apr 2026 00:41:22 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Sofinter-S.p.a</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bfdbb37aad5b9027fdb40b7a522abd566e539d65dc18be380f546b52b5cce3c5</i><br /><br />Target victim <b>website</b>: <i>sofinter.it</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grant-Production-Testing-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31784</link>
<guid>f35f71b69154572b602a36ded3d5e04b</guid>
<pubDate>Thu, 30 Apr 2026 00:40:15 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Grant-Production-Testing-Services</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cd7ffc9fdce10b9cb61d458efec8066a59c5ab73258f4fb34837d895acab4f59</i><br /><br />Target victim <b>website</b>: <i>grantpts.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kichler-Lighting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31783</link>
<guid>79d60d2defe0e8a228ed1fd7fab86e23</guid>
<pubDate>Thu, 30 Apr 2026 00:39:09 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Kichler-Lighting</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfb68bb9e8dbd65c5c81ee747c6d3e712e41de8bb95d74232d03b3499884e23a</i><br /><br />Target victim <b>website</b>: <i>kichler.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Powell-Electronics</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31782</link>
<guid>660bc121513a9d5442e97c5cef85786e</guid>
<pubDate>Thu, 30 Apr 2026 00:38:03 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Powell-Electronics</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0ef18b24363127230ce2646e9f499e9523ffe859e53acb266e8fa75ca5279a6d</i><br /><br />Target victim <b>website</b>: <i>powell.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Central-National-Gottesman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31781</link>
<guid>7d6ff84af104d3d7a8e3b9f86dc7a030</guid>
<pubDate>Thu, 30 Apr 2026 00:36:57 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Central-National-Gottesman</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>68abf3b02a7be66d8344a762e81710f26789cc7bdb61a4d0b6c2ba3559d69fdf</i><br /><br />Target victim <b>website</b>: <i>cng-inc.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Florida-East-Coast-Railway</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31780</link>
<guid>0801dafc88d3117e0db830a42ddf944c</guid>
<pubDate>Thu, 30 Apr 2026 00:35:49 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Florida-East-Coast-Railway</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f21a20bc7bc93ddb88d53eaa589f65f4082d7436d6a71c3918f6a489962f241e</i><br /><br />Target victim <b>website</b>: <i>fecrwy.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Blanchard</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31779</link>
<guid>a39878ae282a18ea051ad89e7875a272</guid>
<pubDate>Thu, 30 Apr 2026 00:34:44 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Blanchard</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>86f28fc1f8907084cc0e54639d90250993cd0e136f60eac976d62aa1052f1f49</i><br /><br />Target victim <b>website</b>: <i>blanchard.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grace-Design-Studios</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31778</link>
<guid>7f1b9e870ce469ea8f20e0a89bbc9ef8</guid>
<pubDate>Thu, 30 Apr 2026 00:33:36 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Grace-Design-Studios</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>185dee0ff0e77e17921e558a68fa9c50645251f069b42bc8961041b25fdb5837</i><br /><br />Target victim <b>website</b>: <i>grace-design.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>TESSCO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31777</link>
<guid>9a5a511ca4f18a61719b12acf46f14c0</guid>
<pubDate>Thu, 30 Apr 2026 00:32:33 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>TESSCO</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7481a6c3ab00154d9a1a920aa158dbac627075e7a27a27cbef03581d882f423b</i><br /><br />Target victim <b>website</b>: <i>tessco.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Englewood-Lab</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31776</link>
<guid>1c0708af4331df1a35dfbdaf8e252d6e</guid>
<pubDate>Thu, 30 Apr 2026 00:31:26 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Englewood-Lab</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>12e0273f84137cfd8e469b4cbacbe682c1e9e7dcc451c440c486fe6f2555b2ee</i><br /><br />Target victim <b>website</b>: <i>englewoodlab.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lc-Industries</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31775</link>
<guid>b3df435f52be5287d9ace3b28e2dcac9</guid>
<pubDate>Thu, 30 Apr 2026 00:30:20 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Lc-Industries</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f2f5a2a3a457f0c3b9701d50ca0d7bd717778d70888391eb09cd4878120a8eb6</i><br /><br />Target victim <b>website</b>: <i>lcindustries.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>SCS-Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31774</link>
<guid>2ab0ebde9cc0cd85fc47ce045d440caf</guid>
<pubDate>Thu, 30 Apr 2026 00:29:23 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>SCS-Engineers</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e44b3c4246f4a6d8f55fd1882f9a1bd0607fc6b312c6fdce7512156918350b7a</i><br /><br />Target victim <b>website</b>: <i>scsengineers.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Epcon-Communities</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31773</link>
<guid>1f910e9557e4fa6c8f9156e96a02d40a</guid>
<pubDate>Thu, 30 Apr 2026 00:28:16 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Epcon-Communities</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>73c30884a045fd3435beb0b401f9af0588dc2ca07d8af8d0a14917414c415c7c</i><br /><br />Target victim <b>website</b>: <i>epconcommunities.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Data-Exchange-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31772</link>
<guid>e8305639398f2f0c3d9cf3af2dd09aeb</guid>
<pubDate>Thu, 30 Apr 2026 00:27:10 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Data-Exchange-Corporation</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>94e9c971b65ca40226b5d91a256eef2a4a9042dc626cd8479daeb72a05b08efb</i><br /><br />Target victim <b>website</b>: <i>dex.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>SunSource</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31771</link>
<guid>9d5d697ea9ea179f7633708d5478c28f</guid>
<pubDate>Thu, 30 Apr 2026 00:26:01 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>SunSource</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e02228968b64bf8f3773b6387abab9d1a948d2dc98b36ffebae6825131914bff</i><br /><br />Target victim <b>website</b>: <i>www.sun-source.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ay</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31770</link>
<guid>ae8ac5e9dffde5cc03562b4e13ac4394</guid>
<pubDate>Thu, 30 Apr 2026 00:24:54 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Ay</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>844a9d1f7924487310fefdae7c873950d6538d767a62b14841cab8bb2d8e5561</i><br /><br />Target victim <b>website</b>: <i>ape****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ho</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31769</link>
<guid>23e18616d10dc96e93805413b83969be</guid>
<pubDate>Thu, 30 Apr 2026 00:24:51 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Ho</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cf0b88ad23f085a9ec854115f221fe03e56bc75b9d53795e2af5d306176aee7</i><br /><br />Target victim <b>website</b>: <i>has****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31768</link>
<guid>576b9b484963479e14d56352f6b383ff</guid>
<pubDate>Thu, 30 Apr 2026 00:24:47 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Fp</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5364d2979fbd060fb546b677bde72cf794c110a20803ad8338f44e5bfb508dc</i><br /><br />Target victim <b>website</b>: <i>fl****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31767</link>
<guid>7b1d3c756fcf7fa90af459bcde18b1d8</guid>
<pubDate>Thu, 30 Apr 2026 00:24:44 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Sp</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26f35699bf9850c447aac8427e6af9cb01ae58f43d80f27d771678291d922519</i><br /><br />Target victim <b>website</b>: <i>s****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hl</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31766</link>
<guid>ed3551789fc0376ff8938b6827b16eae</guid>
<pubDate>Thu, 30 Apr 2026 00:24:41 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Hl</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2fcd963615d7d7d0ab09f74de9904c4766bb44258f6cc4c12f0d7f814aaf7960</i><br /><br />Target victim <b>website</b>: <i>t****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Na</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31765</link>
<guid>aa954eb9fc47e002ecbf68b60517a3de</guid>
<pubDate>Thu, 30 Apr 2026 00:24:40 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payoutsking</b> claims attack for <b>Na</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f65e5c92137ee734ddb022919391b1cf0f99ce51c046c36b430cee1075e15420</i><br /><br />Target victim <b>website</b>: <i>n****.com</i>]]></description>
<category>payoutsking</category>
</item>
<item xmlns:dc='ns:1'>
<title>Color-Communications-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31764</link>
<guid>42751fb669b1fe8b899c5a70deb061d8</guid>
<pubDate>Wed, 29 Apr 2026 23:51:34 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>secpo</b> claims attack for <b>Color-Communications-LLC</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>652d72f8a5127bbfceb122b5b0f8799aafc9f201449faba0c70a93808653d179</i><br /><br />Target victim <b>website</b>: <i>ccicolor.com</i>]]></description>
<category>secpo</category>
</item>
<item xmlns:dc='ns:1'>
<title>Iowa-Spring-Manufacturing--Sales</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31763</link>
<guid>e834628a514af2290509181bf4348c6d</guid>
<pubDate>Wed, 29 Apr 2026 23:23:27 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Iowa-Spring-Manufacturing--Sales</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>727ca76913809c4005afe5de03b47b78b8365dec9921d987b814efe6478c0c28</i><br /><br />Target victim <b>website</b>: <i>iowaspring.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Karl-Chevrolet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31762</link>
<guid>ae4b023d09c50fbd267176ede23a3fa7</guid>
<pubDate>Wed, 29 Apr 2026 22:00:11 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Karl-Chevrolet</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f5f204c1d1a158f50d105552a7da0b3db6bf94adee67970f560aba4e64bb784a</i><br /><br />Target victim <b>website</b>: <i>www.karlchevrolet.com</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bentley-Capital-Ventures</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31761</link>
<guid>b667279b6400b4c05f3b5c4241e8bf7f</guid>
<pubDate>Wed, 29 Apr 2026 21:59:49 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>radar</b> claims attack for <b>Bentley-Capital-Ventures</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>565d0f881d5e2adec5d3cc26589ceff60e1318b6877bd2541ba4fd3d36ee1608</i><br /><br />Target victim <b>website</b>: <i>bentleycapitalventures.com</i>]]></description>
<category>radar</category>
</item>
<item xmlns:dc='ns:1'>
<title>PROM-Peakside-Ros-Outlet-Management</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31760</link>
<guid>a7290c5bd7bc2aaa7ea2b6c957ef639b</guid>
<pubDate>Wed, 29 Apr 2026 21:58:18 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>PROM-Peakside-Ros-Outlet-Management</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>30e182ef2e7c06b71914642d92f669055b9ceb7a72a995e82f33c8127e579825</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>zsiclife.co.zm</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31759</link>
<guid>e03814c1d555e06aa5d562d95ed29bd2</guid>
<pubDate>Wed, 29 Apr 2026 21:53:51 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>krybit</b> claims attack for <b>zsiclife.co.zm</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8d7a40f220e513ace223a6d09bb28ce59f68f59eaace44555a8d5915dcc2e46a</i><br /><br />Target victim <b>website</b>: <i>zsiclife.co.zm</i>]]></description>
<category>krybit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanta-Genetics-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31758</link>
<guid>decff3a1f694fccd108d4ce07b2587b5</guid>
<pubDate>Wed, 29 Apr 2026 21:37:01 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Advanta-Genetics-LLC</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a1a719e68510bf201bd59ec98df948a5eb0ed8355bff3bd7eb1090f036243254</i><br /><br />Target victim <b>website</b>: <i>aalabs.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baresque-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31757</link>
<guid>af988312978fad72c24e545c31bf8a49</guid>
<pubDate>Wed, 29 Apr 2026 21:36:39 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Baresque-Group</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de9b5ac106e7c5fd30ab02a754b2fbd369cd884b6f9b15262a432afb0512e446</i><br /><br />Target victim <b>website</b>: <i>baresquegroup.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cheval-Blanc-Randheli</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31756</link>
<guid>e58e29db292ff8dfbbe41afb846e469e</guid>
<pubDate>Wed, 29 Apr 2026 21:36:18 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Cheval-Blanc-Randheli</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1450a5e29c1158412dddf88cfe9a9b220c12a092c7106ab30e6bb2281ac0ef77</i><br /><br />Target victim <b>website</b>: <i>chevalblanc.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Law-Offices-of-Michael-A.-Freedman-P.A.-maflaw.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31755</link>
<guid>4ecb8876b622f561d9d13161071f518c</guid>
<pubDate>Wed, 29 Apr 2026 21:35:56 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Law-Offices-of-Michael-A.-Freedman-P.A.-maflaw.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9ccae79ff2f69b86f92875aade4b1ea4e43c4615198787600903509dde72493c</i><br /><br />Target victim <b>website</b>: <i>maflaw.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Atlas-Metal-Industries-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31754</link>
<guid>0207ceaa30eeb7df0c51ed30959480ec</guid>
<pubDate>Wed, 29 Apr 2026 21:35:32 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Atlas-Metal-Industries-Inc</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f38ee012b560f6a27ddcdf3075aaec18f8e8c61645ae53d683af54bbf5cb455f</i><br /><br />Target victim <b>website</b>: <i>atlasfoodserv.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Costa-Solutions-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31753</link>
<guid>56fe38b77cb4f52e8f2770e874f57875</guid>
<pubDate>Wed, 29 Apr 2026 21:35:01 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Costa-Solutions-LLC</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>21fbe7230b2f36501ab4dee782a10be1fd439a28fa0ef2a9ebdebacd0561e92d</i><br /><br />Target victim <b>website</b>: <i>costasolutions.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Bayou-Title-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31752</link>
<guid>4371a529ba9a419a1dc903bcd8856251</guid>
<pubDate>Wed, 29 Apr 2026 21:34:40 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>aurora</b> claims attack for <b>Bayou-Title-Inc.</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0205491ff52497df3d511d8cd992285d644580c55357f2c19db850bb0c6af916</i><br /><br />Target victim <b>website</b>: <i>bayoutitle.com</i>]]></description>
<category>aurora</category>
</item>
<item xmlns:dc='ns:1'>
<title>Eduporium</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31747</link>
<guid>3066b11b58eb7fb925b67d25c54e3234</guid>
<pubDate>Wed, 29 Apr 2026 19:55:49 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Eduporium</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>190800a1c011e724e9b72cd358a67444d01b56c27a80b3ae452dda48cb73f287</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Probity-Contracting-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31748</link>
<guid>144679b5d1ddb8650c3155c645a1d976</guid>
<pubDate>Wed, 29 Apr 2026 19:55:48 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Probity-Contracting-Group</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc6bb6e7e013507fb7e6abdc5e74547bef9e24ba2bf0cdb0e4709cdb3a5586ee</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Metro-ILA-Funds</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31749</link>
<guid>4295cd213a56a1c6ec066caf5dd08f16</guid>
<pubDate>Wed, 29 Apr 2026 19:55:48 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Metro-ILA-Funds</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ce0a1b79713ec1f9e67ed76313b4830c37c4e1f3441f3301b6ae1d87eafe40fb</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Edenshaw-Developments</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31750</link>
<guid>61905c201ff056edbc80a8e7d634d5c1</guid>
<pubDate>Wed, 29 Apr 2026 19:55:47 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Edenshaw-Developments</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b0b7702f35a4ef4c7b351fab85d78f8cee73220a4cd52f186a8b091ab713833</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Antica-Sartoria</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31751</link>
<guid>13a69ec888022968c96b79f48f62fd2a</guid>
<pubDate>Wed, 29 Apr 2026 19:55:46 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Antica-Sartoria</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4562c9212eb3606842b6cb3aaab4385d40dfa2be94ce744206769b43dcc624c7</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>planetsport.ma</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31746</link>
<guid>b57a35f9dda9f73ab2c04e1a6963c932</guid>
<pubDate>Wed, 29 Apr 2026 10:33:04 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>planetsport.ma</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b41192a82492874df53703b28204b8ec6862312285fd22cc4942ae22515b5486</i><br /><br />Target victim <b>website</b>: <i>planetsport.ma</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>pricon.com.ph</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31745</link>
<guid>ed21b54c417d6d8638aef8efc652fe37</guid>
<pubDate>Wed, 29 Apr 2026 10:32:51 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>pricon.com.ph</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ce460bff0385f80ca1178e1fae6c87fe9e4a0bf3b1e76aa7212eb7dbe89f4cf</i><br /><br />Target victim <b>website</b>: <i>pricon.com.ph</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>instapack.es</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31744</link>
<guid>986e781559edbb32e805d4b135780812</guid>
<pubDate>Wed, 29 Apr 2026 10:32:35 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>instapack.es</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d47af6dccb0588fe986437c0852ed9efe7a0916c0ad660d554f12313d54f84b</i><br /><br />Target victim <b>website</b>: <i>instapack.es</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>stllc.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31743</link>
<guid>59b6525364c77d1e6f9c79c53e387954</guid>
<pubDate>Wed, 29 Apr 2026 10:32:22 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>stllc.org</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0520082af8a0475d5acd9b6d6911926bd240f59270f23b1aacd612139f46495b</i><br /><br />Target victim <b>website</b>: <i>stllc.org</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>dmschweiz.ch</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31742</link>
<guid>c545987fb970f7b1f05c9f2a2f3340dd</guid>
<pubDate>Wed, 29 Apr 2026 10:10:38 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>dmschweiz.ch</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fcc67b6297038931598b98aa3cb36b6539cbe2090b620a5aad4fcf32ad6b1e9</i><br /><br />Target victim <b>website</b>: <i>dmschweiz.ch</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>anvilarts.org.uk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31741</link>
<guid>2ab5569b4274a31c7f2b7c67cd9ba9e2</guid>
<pubDate>Wed, 29 Apr 2026 10:10:21 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>anvilarts.org.uk</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ac059e6799ddceba6682e05a5e0405dceef6f1041e5501f41b714bee3d7db016</i><br /><br />Target victim <b>website</b>: <i>anvilarts.org.uk</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>primeproperties.com.au</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31740</link>
<guid>fb6cf395c453fdafb241d6d887e6aefe</guid>
<pubDate>Wed, 29 Apr 2026 10:10:00 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>primeproperties.com.au</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ca950f305b94dae9f987607f078ca8009eba86c6fafb3b519e36a54833dee554</i><br /><br />Target victim <b>website</b>: <i>primeproperties.com.au</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>airdriephysio.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31739</link>
<guid>16a359f1f323bca3b0448e6c8ca5bec5</guid>
<pubDate>Wed, 29 Apr 2026 10:09:42 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>airdriephysio.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f9acc950c0ace9d2d7cc0aee45c2a67b695cf15e15f3e079f973d316ebe8982e</i><br /><br />Target victim <b>website</b>: <i>airdriephysio.com</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>rainforestclean.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31738</link>
<guid>dbaebce9c842f6aa7482517597c75c8c</guid>
<pubDate>Wed, 29 Apr 2026 10:09:24 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>rainforestclean.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f50728ec93640d5ca8341cf1fcdfb7c89444d919e9e44db1e1dbfde3edc44e9a</i><br /><br />Target victim <b>website</b>: <i>rainforestclean.com</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>rotak.it</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31737</link>
<guid>29430ba87f428a5f10b3a531b0761f15</guid>
<pubDate>Wed, 29 Apr 2026 10:09:07 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>rotak.it</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b412664f6b126388d45055f434451c655b2f8082de938f19fbc4fd2aa32483fe</i><br /><br />Target victim <b>website</b>: <i>rotak.it</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>osoftec.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31736</link>
<guid>0df5627695c1aaf2a2be5c738a80f0c3</guid>
<pubDate>Wed, 29 Apr 2026 10:08:49 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>osoftec.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4ce2dcab484894fe3d78244932e68d88b2ecd81cb138ddd03a684515a5f9a13b</i><br /><br />Target victim <b>website</b>: <i>osoftec.com</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>boxtopia.co.uk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31735</link>
<guid>e35adc826b021f91f72f183d1bb24773</guid>
<pubDate>Wed, 29 Apr 2026 10:08:27 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>boxtopia.co.uk</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a16ed7a1a16f44aad08e7297270f8c262a7de2e488dcd26b47e8390a97a16e43</i><br /><br />Target victim <b>website</b>: <i>boxtopia.co.uk</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mediaworks-Kft</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31733</link>
<guid>93aaa29263d4040a9099001cc887d333</guid>
<pubDate>Wed, 29 Apr 2026 03:56:18 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Mediaworks-Kft</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e6e3838cbf35f816877575b08f964cae18b5a0c356bbdc196882c8699d8232ad</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>httpswww.fulcrumre.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31734</link>
<guid>effa3b908aaa9f8744b980829a6bfd15</guid>
<pubDate>Wed, 29 Apr 2026 02:23:08 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>httpswww.fulcrumre.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2624000b9d0697a2c75c098e7aa0deeab6591c3f3d6afb8ef02a9862db149c8b</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>nbd3pl.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31732</link>
<guid>407688b935e4079fecd2b2daefb6432e</guid>
<pubDate>Wed, 29 Apr 2026 00:22:28 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>nbd3pl.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>78da6e95ee46e433a61c2da1b393c0d490abc104747e81c0d2f82f86f35d37a8</i><br /><br />Target victim <b>website</b>: <i>nbd3pl.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Indonesias-Customs-Analytics-Platform</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31731</link>
<guid>5ec11c9c51904e1a37a76d1acc14aa0f</guid>
<pubDate>Tue, 28 Apr 2026 22:52:08 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Indonesias-Customs-Analytics-Platform</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d06b37c189f3a83812c096ec1013c46114bfdbfce4d12b2bf5fa369577306f9</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>cadencepetroleum.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31730</link>
<guid>306ee6a27d95b01dd69ee72920cf25ed</guid>
<pubDate>Tue, 28 Apr 2026 20:51:15 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>cadencepetroleum.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8ab47fb118b99fa27aef1f6db70e77d24d5699c10d82d089c40e4ce5a8a7867b</i><br /><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/cadence-petroleum-group/476578914|</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nephrology-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31729</link>
<guid>2325577fcece567803aff8703a899116</guid>
<pubDate>Tue, 28 Apr 2026 20:25:01 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>insomnia</b> claims attack for <b>Nephrology-Associates</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bdd582a3ffc7fd61131d94c4bf85f39678f2c4b6cbbdbced918c88aaa82bad14</i><br /><br />Target victim <b>website</b>: <i>www.arnapa.com</i>]]></description>
<category>insomnia</category>
</item>
<item xmlns:dc='ns:1'>
<title>Basch--Keegan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31724</link>
<guid>045723a2e194ae8b07890dace311b402</guid>
<pubDate>Tue, 28 Apr 2026 19:54:45 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Basch--Keegan</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04dc432059295e32e5667769cee15a3cf6d59bcc02f284e9a0ff14446dbf64e5</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Silicon-Alley</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31725</link>
<guid>cb5f437833b580d047e697e150c45c57</guid>
<pubDate>Tue, 28 Apr 2026 19:54:44 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Silicon-Alley</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5c999e9d19515f805f4c8a724bd72410fc52ce31f1c59dc776a126b9999ea28a</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>KarmaData</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31726</link>
<guid>0f7a529e4a851625fee72161a84b4ca1</guid>
<pubDate>Tue, 28 Apr 2026 19:54:43 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>KarmaData</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5c653ead4aaff95fedc38e1129fbafeaee5aeb9a0012839a282242910378eec</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>TYLin-International-Group---Taiwan-Branch</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31727</link>
<guid>effbb64ff6c9b38c6fcb05185cd22fc3</guid>
<pubDate>Tue, 28 Apr 2026 18:55:24 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>TYLin-International-Group---Taiwan-Branch</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>764650e4bda40d7e726c112b77fe03a222e5ba9a7c4881ab099dfe102fe764b9</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Construction-Sciences</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31728</link>
<guid>dcd452092643b695257a74108459b8f3</guid>
<pubDate>Tue, 28 Apr 2026 18:55:23 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Construction-Sciences</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03119eec85fa350a7fd8d1092457cebdecee6eb653adb4c52fd18691ba148b27</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Floyd-Skeren-Manukian-Langevin-LLP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31723</link>
<guid>b903548eebca1c3b8a3b81e5002f3490</guid>
<pubDate>Tue, 28 Apr 2026 14:45:13 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Floyd-Skeren-Manukian-Langevin-LLP</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ba150023491e32df8be28e7366192aeb3e09a45a0fe04524d6e57aee81dc144f</i><br /><br />Target victim <b>website</b>: <i>floydskerenlaw.com</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>INJURYLAWYERS.COM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31722</link>
<guid>27e34e1093ba7e24075b9f5b25dcf5a7</guid>
<pubDate>Tue, 28 Apr 2026 14:39:28 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>clop</b> claims attack for <b>INJURYLAWYERS.COM</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a345134aeb76fb1259b28b56032389b60a8af1fdba09920529da9207ef96295f</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>clop</category>
</item>
<item xmlns:dc='ns:1'>
<title>DIME-Distribuidora</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31718</link>
<guid>5ffebde8e98ee4b9c98fcc1b30fffef6</guid>
<pubDate>Tue, 28 Apr 2026 13:55:49 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>DIME-Distribuidora</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd041698b2b22fe21edabdb243dfb1d27fe865c952fab75981399ef254b58418</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Carma-Packaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31719</link>
<guid>4493a8d38776f690a0b661af37a30cfe</guid>
<pubDate>Tue, 28 Apr 2026 13:55:48 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Carma-Packaging</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dcf20bf59b4abe585c0399dcd79451b9de9f67d84a5ec1af90abe6cf6213b78e</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Intikom</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31720</link>
<guid>0ff9d78576b6c07d814ae5daab2e8d28</guid>
<pubDate>Tue, 28 Apr 2026 13:55:47 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Intikom</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>022bb0fdad11b22b2827b2ebfab5b7c4038c5fe58edb71eb8f0c9938a06cfce8</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>moser-spiel.at</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31721</link>
<guid>b9e702b9182246d9ad08bef0c2229f6b</guid>
<pubDate>Tue, 28 Apr 2026 12:34:00 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>krybit</b> claims attack for <b>moser-spiel.at</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7ac8a686f34d0dbaaab766c9ca49c5598ca81bed16251ae177869a97eb2b371a</i><br /><br />Target victim <b>website</b>: <i>moser-spiel.at</i>]]></description>
<category>krybit</category>
</item>
<item xmlns:dc='ns:1'>
<title>www.durable-tech.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31717</link>
<guid>1dbdb6a977dd83e68f9078c05da938c6</guid>
<pubDate>Tue, 28 Apr 2026 09:41:17 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>www.durable-tech.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b43e7e1578c15621ae1ca00c07785536c683837525027916de1ea26a2c3257ef</i><br /><br />Target victim <b>website</b>: <i>www.durable-tech.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vimeo-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31716</link>
<guid>3d1ed124d48ac4f12106b32decf840b0</guid>
<pubDate>Tue, 28 Apr 2026 05:38:33 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Vimeo-Inc.</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>435fc106f5766671d53c12474f0f4b98708d661eba1cf427fa7f28462dd852c9</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Super-AI</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31715</link>
<guid>4c24085bb62faf1e7e113767f837802d</guid>
<pubDate>Tue, 28 Apr 2026 04:12:48 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>everest</b> claims attack for <b>Super-AI</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>36cb8516e57efdc7d17d4111f7c579d415407da7a43cff9d714fe10d453a21e5</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>everest</category>
</item>
<item xmlns:dc='ns:1'>
<title>sumacinc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31714</link>
<guid>4635d9474a5ef94cd03d40e385f4b177</guid>
<pubDate>Tue, 28 Apr 2026 03:26:37 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>sumacinc.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b62dc48929cd018938f15baf643fee1294f347acc26a62c4bd1521ce61c5b70e</i><br /><br />Target victim <b>website</b>: <i>sumacinc.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cybersecurity-Vendor</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31713</link>
<guid>a5be7e784650548b8fc47a6d067b52b4</guid>
<pubDate>Tue, 28 Apr 2026 01:54:53 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>ransomhouse</b> claims attack for <b>Cybersecurity-Vendor</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>00281362fd5ec47933b289c3d85284436bf32adf72350c23633a5193d45361a8</i><br /><br />Target victim <b>website</b>: <i>*********.***</i>]]></description>
<category>ransomhouse</category>
</item>
<item xmlns:dc='ns:1'>
<title>Lifeline-PCS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31712</link>
<guid>872def1eaad20180f042ac8764629220</guid>
<pubDate>Mon, 27 Apr 2026 22:53:20 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Lifeline-PCS</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb5f2e924603d680ad8f8e67b004e3b147e5305e517135af965956222b27c295</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Birtcher-Anderson--Davis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31710</link>
<guid>c070bfe7f385b5bdda1dcd920c4965a6</guid>
<pubDate>Mon, 27 Apr 2026 21:52:42 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>Birtcher-Anderson--Davis</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>069fd3e918853fcea8e00d079438753a56c58ef60323a49b30c342b0bb9283a8</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Leone-Film-Group-SpA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31711</link>
<guid>3b155e7975caedac55e57c64b23d2843</guid>
<pubDate>Mon, 27 Apr 2026 21:52:39 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Leone-Film-Group-SpA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c70b60f76b1e38af4df19c957c5d6e882e86328644de4c43a5a887af82827da9</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Floyd-Skeren-Manukian-Langevin-LLP-Information</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=31709</link>
<guid>b96a8bcf64591ca8e9c43f114de1daba</guid>
<pubDate>Mon, 27 Apr 2026 18:38:07 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Floyd-Skeren-Manukian-Langevin-LLP-Information</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dd1756132e6fdd7242c9378bb9401a893e89cf84a3d97fca100c151c8a4485d2</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
</channel>
</rss>
