[KILLSEC] – Ransomware Victim: JSSR Options Co[.], Ltd[.] (JSSR)

image

Ransomware Group: KILLSEC

VICTIM NAME: JSSR Options Co[.], Ltd[.] (JSSR)

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the KILLSEC Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page contains information about multiple organizations impacted by a recent security breach. One notable victim is Tumeny Payments Limited, which is an online payment solutions provider that caters to various enterprises, SMEs, and developers. The company focuses on enabling online payments, SMS messaging, and digital bookkeeping through a single integrated platform. This indicates the potential for significant disruption given its role in facilitating essential financial transactions.

Additional details reveal that JSSR Options Co., Ltd., which operates mainly in the auction and logistics sectors, experienced a data breach where 1 percent of its data was published. This company is known for its auction platform, logistics services for transporting imported goods such as agricultural machinery and vehicles, and other products found in tax-free zones. Similarly, TFTH, an educational support platform tailored for college students in Australia, also had 1 percent of its data published, reflecting vulnerabilities that could expose sensitive student information. Finally, Interforos, another affected organization specializing in talent acquisition for the entertainment industry, reported the same level of data exposure. The leak page features a total of four images related to the breached content but does not include any download links.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.