Ransomware victim disclosure
← All victimsEpia Financial Services
listed as Namibia | Epia Financial Services | Windhoek · Claimed by radar · listed 8 months ago
Status timeline
- Listed
Sep 11, 2025
- Data leaked
At a glance
- Group
- radar
- Status
- Data leaked
- Country
- NA
- Sector
- Financial Services
- Listed on leak site
- Sep 11, 2025
About the victim
AI dossier — public-source company profileEpia Financial Services is a financial services firm based in Windhoek, Namibia. The company operates in the financial sector, offering services to clients in Namibia. Limited public information is available about its specific service offerings or scale.
- Industry
- Financial Services
- Address
- Windhoek, Namibia
Attack summary
Severity: critical — The victim is a financial services company and data has been confirmed published by the threat actor, indicating exfiltration of potentially regulated financial and client PII data from a financial institution.The Radar ransomware group claims to have compromised Epia Financial Services and has published data (disclosed status: data_published), indicating exfiltration of company data. No ransom amount or specific data volume was stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Financial records
- Client data
- Internal business documents
What the group claims
+264816013040. Mail. [email protected]. Home. No 17 Eulenweg Street, Hochland Park, Windhoek ,Namibia. RELATABLE PARTNERS. NAMRA · NAMFISA. NBWPF. CIFNAMIBIA
The leak post
captured from the group's siteTUAN LE Construction Company Limited Chek Tan and Company, LLP Fouad Alghanim & Sons Group of Companies Holding W.L.L. R F Owens Co, Inc./ Trucchi's Supermarkets Distribution Center Compagnie des Guides de Chamonix Namibia | Epia Financial Services | Windhoek Menten Truck Service N.V., Hoeselt, Belgium ROBERT G. DASHIELL, JR., P.E., INC
Screenshot of the leak post

Sources
Source
Indexed 8 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
