Ransomware victim disclosure
← All victimsINC RANSOMWARE...
Claimed by Donutleaks · listed 3 years ago
Status timeline
- Listed
Sep 30, 2023
- Data leaked
At a glance
- Group
- Donutleaks
- Status
- Data leaked
- Country
- United States
- Sector
- Technology
- Listed on leak site
- Sep 30, 2023
About the victim
AI dossier — public-source company profileThe victim is listed as 'INC RANSOMWARE', which appears to refer to the INC Ransomware threat-actor group itself rather than a conventional company. The leak post context suggests this may be an intra-criminal dispute in which Donutleaks is publishing data allegedly stolen from INC Ransomware operators, not a legitimate corporate victim.
Attack summary
Severity: low — There is no identifiable legitimate company victim, no described regulated or sensitive data exfiltration, and no operational disruption to a real organisation. The post appears to document an intra-criminal dispute rather than a corporate ransomware attack.Donutleaks claims that data was stolen from them (or from the entity in question) by individuals operating under aliases 'hulk', 'boss', and 'MoonPrism', and is warning other blog operators not to publish material provided by those individuals. No conventional encryption or corporate-victim exfiltration is described.
What the group claims
...and other... Appeal to the blog owners: if you work honestly and do not want to stain yourself with dirt and theft, do not post anything that the thief and scammer known as hulk, boss, MoonPrism asks you to post. All the data was stolen from us, and one of…
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
