Ransomware victim disclosure
← All victimsVision Inks and Resins Limited
Claimed by Stormous · listed 2 months ago
Status timeline
- Listed
Mar 30, 2026
- Data leaked
At a glance
- Group
- Stormous
- Status
- Data leaked
- Country
- India
- Sector
- Manufacturing
- Listed on leak site
- Mar 30, 2026
- Data size
- 33 GB
- Ransom demanded
- $900
About the victim
AI dossier — public-source company profileVision Inks and Resins Limited (previously known as Vision Inks & Resins) is an Indian manufacturer established in May 1999, with its factory located at MIDC, Murbad, Maharashtra, India. The company operates in the specialty chemicals manufacturing sector, producing inks and resin-based products.
- Industry
- Inks & Resins Manufacturing
- Address
- MIDC, Murbad, Maharashtra, India
- Founded
- 1999
Attack summary
Severity: high — 33 GB of data has been confirmed exfiltrated and published, including internal corporate documentation, operational records, engineering drawings, and network access credentials. The provision of VPN access to internal systems compounds the severity beyond a simple data leak.Stormous claims to have exfiltrated 33 GB of data from Vision Inks and Resins Limited, with the data published. The group is offering VPN access to the company's internal network alongside the leaked data.
Data the group says was taken
AI dossier — extracted from the leak post- Internal corporate documentation
- Administrative and system files
- Operational records
- Engineering drawings and schematics
- Project planning and execution documents
- Email and communication data
- Financial records
- VPN/network access credentials
What the group claims
Customer names, identification numbers, production orders, client records, delivery tracking data, customer information, logos, and more. VPN access to the company's internal network is provided.
The leak post
captured from the group's siteInitial Access Brokers - Long-Term Collaboration We are currently seeking reliable Initial Access Brokers for long-term collaboration. ** Please do not waste time attempting complex exploit development or direct EDR confrontation. We are interested exclusively in stable corporate access. Local user access is acceptable. * Small to mid-sized enterprises: fixed payment starting at * Large enterprises: revenue share from final settlement FANASA.COM Half the data has been extracted Personally Identifiable Information (PII), Electronic Fiscal Documents (CFDI/XML), Financial Transaction Records, Commercial Invoices & Billing Data, Taxpayer Identification Numbers (RFC), Client & Vendor Database/Internal Corporate Documentation Administrative/System Files/ADMIN, DOAS, operational records, engineering drawings, schematics... Project Planning & Execution Documents... (Folders/Files) Email/Communication/System/Application Data AYEAPLICACIONES database/Log Data BDATOSFITCLOD, Software/Installation/Program Files AUTOBOU, Personal/Miscellaneous Files AvenaCubana All of this data is offered for sale (user information: email, phone number, full name, date of birth / payment and bookin…
Data the group says was taken
- PII
- financial
Sources
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
