[INTERLOCK] – Ransomware Victim: Indesign, LLC

image

Ransomware Group: INTERLOCK

VICTIM NAME: Indesign, LLC

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the INTERLOCK Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

Indesign, LLC, a multi-discipline engineering design firm located in the United States, has recently been featured on a ransom leak page attributed to a group identified as “interlock.” The leak indicates that sensitive information has been compromised and includes references to substantial projects associated with major corporations such as Microsoft, IBM, Rolls-Royce, and Intel. Among the leaked data, there is mention of a large SQL database, comprehensive development projects, and personal information of employees. The compromise date for this data breach was discovered on November 19, 2024, marking a significant incident for the company.

The ransom leak page outlines various statistics concerning the company’s data exposure, detailing two employees and the presence of multiple third-party domains linked to the breach. The total number of affected third-party entities amounts to sixteen, although there are no reported compromises concerning users. Updates regarding the leak were also noted on the same day as the publication. Additionally, the page includes a screenshot depicting internal leak-related details in a neutral format, although no explicit graphic content is present. Potential download links or additional data leaks were implied but not explicitly detailed.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.