2 0
Read Time:4 Minute, 12 Second

http://xw7au5pnwtl6lozbsudkmyd32n6gnqdngitjdppybudan3x3pjgpmpid.onion/

Below is a list of companies that either have considered their financial gain to be above the interests of their partners / individuals who have entrusted their data to them or have chosen to conceal the fact that they have been compromised.

Ipca Laboratorieshttps://www.ipca.com/

1024

Status:

EVIDENCE

Action:

Encrypted

Action date:

03/09/2022

8 Italy Districts

34213

Status:

DISCLOSED

Action:

Encrypted

Action date:

27/07/2022

Fairfax – Crum & Forsterhttps://www.cfins.com https://www.fairfax.ca

56229

Status:

EVIDENCE

Action:

Encrypted

Action date:

20/03/2022

Summit Carehttps://www.summitcare.net/

68980

Status:

DISCLOSED

Action:

Encrypted

Action date:

10/06/2022

Advanced Micro Devices, Inchttps://www.amd.com/

85229

Status:

SOLD

Action:

Leak

Action date:

05/01/2022

SHOPRITE HOLDINGS LTDhttps://www.shoprite.co.za/

100331

Status:

SOLD

Action:

Leak

Action date:

06/06/2022

AHS Aviation Handling Services GmbHhttps://www.ahs-de.com

143242

Status:

DISCLOSED

Action:

Encrypted

Action date:

16/04/2022

Dellner Couplers ABhttps://www.dellner.com

142876

Status:

SOLD

Action:

Encrypted

Action date:

08/04/2022

Jefferson Credit Unionhttps://www.jeffersoncreditunion.org

143095

Status:

DISCLOSED

Action:

Encrypted

Action date:

10/12/2021

Saskatchewan Liquor and Gaming Authorityhttps://www.slga.com

143036

Status:

DISCLOSED

Action:

Encrypted

Action date:

20/12/2021

We have nothing to do with any breaches and don’t produce or use any ransomware. Our primary goal is to minimize the damage that might be sustained by related parties. RansomHouse members prefer common sense, good conflict management and intelligent negotiations in an effort to achieve fulfillment of each party’s obligations instead of having non-constructive arguments. These are necessary and sufficient principles that lead to amicable agreements and sometimes even to subsequent productive and friendly cooperation.

RansomHouse shares the opinion of both Red and Blue teams regarding the threats of data leaks. The very possibility of such incidents taking place is a strong incentive to make the private sector, corporations and the public aware of data security and privacy issues and should make those involved in 3rd parties’ personal information collection and storage responsible and respectful of their responsibilities. Unfortunately, more often than not CEOs prefer to close their eyes on cybersecurity saving budget on their staff or spending huge amounts of money mindlessly, which inevitably leads to vulnerabilities.

We believe that the culprits are not the ones who found the vulnerability or carried out the hack, but those who did not take proper care of security. The culprits are those who did not put a lock on the door leaving it wide open inviting everyone in. People are inherently curious and are eager to learn the object of their interest. Usually corporations respond to the message that their “doors are wide open” in negative context, direct threats or silence. In rare cases one could meet gratitude and ridiculously small payments that do not cover even 5% of an enthusiast’s efforts. Well, the negative reaction is understandable, because the company management will have a hard time explaining millions of dollars spent on security audits and cybersecurity staff high salaries to their shareholders with some freelancer around pointing out the global mistakes they’ve made, bringing their managerial skills and the results of spending money to the ground. A close example to you might be Lehman Brothers who were warned about severe vulnerabilities in their economic risk management model six months in advance before the collapse – warned by three enthusiastic economist-mathematicians who got nothing but mocks from the fund.

But evolution cannot be stopped, fitting structures emerge in every environment, and so groups of enthusiasts have emerged on the grounds of data negligence, eager to get paid honestly by streamlining this chaos through public punishment. These methods of making money and pointing out companies’ mistakes may be controversial, and when you recall that we are talking about billion-dollar corporations on the opposing side, it becomes clear why the RansomHouse team is so important to engage in dialogue. That is what this project is all about – bringing conflicting parties together, helping them to set up a dialogue and make informed, balanced decisions. The team works hard to find a way out of even the most difficult situations and allow both parties to go forward without changing rules as they go along. Incompetence and fuss is unacceptable when dealing with such cases, which is exactly what happens most often. Here and now we are creating a new culture and streamlining this industry.

Unfortunately, companies that refuse negotiations and reject reasonable arguments, companies that are unwilling to pay for this kind of work – will face reputational and legal costs. In order to highlight these cases we will not only disclose information on our website and official Telegram channel but also attract the attention of journalists, public and third parties to the problem and do everything needed to make the incident as public as possible. Information accessibility is one of the foundations of a civilized society and a way for it to rise above itself and overcome social challenges.

©RansomHouse

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence