[BLACKBASTA] – Ransomware Victim: weberpackaging[.]com

image

Ransomware Group: BLACKBASTA

VICTIM NAME: weberpackaging[.]com

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the BLACKBASTA Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The leak page details a significant data compromise involving Weber Packaging Solutions, a prominent player in the manufacturing sector based in the United States. The organization specializes in the innovative design, engineering, manufacture, and supply of high-performance pressure-sensitive labels, labeling systems, and inkjet systems. As per the reported information, a substantial amount of sensitive data, estimated at approximately 900 GB, has been compromised. This includes a wide array of personal documents, financial data involving accounting and payroll, human resources records, budgetary information, as well as other confidential materials protected under non-disclosure agreements. The compromise was uncovered on October 29, 2024.

The threat group associated with this breach is identified as ‘Black Basta’. The page suggests that the data leak includes information regarding two users, indicating some level of human involvement, although no details about employees or third-party organizations were specified. The reported categories of stolen data highlight the potential impact on the organization’s operations and its stakeholders. Furthermore, links to download the compromised data may be available on the leak page, but exact URLs and sensitive identifiers have been omitted for confidentiality. A screenshot of the leak page is also accessible, showing illustrative content that reflects the nature of the compromised information without exposing any specific sensitive details.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.