[ABYSS] – Ransomware Victim: kingpower[.]com

image

Ransomware Group: ABYSS

VICTIM NAME: kingpower[.]com

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the ABYSS Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

On January 8, 2025, a report surfaced regarding a ransomware leak associated with King Power, a prominent duty-free retailer based in Bangkok, Thailand. This incident reveals that King Power, which offers a range of travel-related services and products both online and at airport outlets and major tourist venues, has been a target of the ransomware group known as “abyss.” Specifics regarding the incident remain unspecified, but the discovery date suggests that data may have been compromised recently, potentially affecting a substantial amount of confidential information related to employees and third-party entities connected to the organization.

The leak indicates that the retailer has approximately 132 employees and notably, a higher volume of users, with 1,651 identified. The data breach may also impact 54 third-party services linked to their operations. While no download links or specific leaked information were provided in the report, the threat posed by the group underscores significant potential vulnerabilities within the retail sector, especially for organizations handling sensitive customer and operational data. Further investigation may be necessary to assess the full scope of the breach and to implement any needed security measures to safeguard against future attacks.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.