BlackCat/ALPHV Ransomware Victim: Libyana was hacked[.] A company with an enormous amount of vulnerabilities has allowed its customers’ confidential data to be stored[.]
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the ALPHV Onion Dark Web Tor Blog page
Company Info
- Company Name:
Libyana was hacked. A company with an enormous amount of vulnerabilities has allowed its customers’ confidential data to be stored.
Dark Web Info
- Date Listed:
12/05/2023, 08:02:36 - Screenshots Available:
Screenshots of PII Available - Files available to download:
N/A
Description
- !!! ATTENTION !!! !!! LIBYANA – THE MOST INSECURE IN LIBYA WITH MANY VULNERABILITIES, COOPERATING WITH IT THREATENS YOU WITH A LEAK OF YOUR CONFIDENTIAL DATA !!! !!! WE RECOMMEND THAT ALL LIBYANA CUSTOMERS IMMEDIATELY TERMINATE ALL CONTRACTS WITH THIS COMPANY OR THEIR PERSONAL DATA MAY BE USED FOR CRIMINAL PURPOSES !!! LIBYANA does not care about protecting the personal and sensitive data of its customers and partners. A lot of critical data has been stolen including: – Financial and accounting documents – Personal information and passport data – Databases – Auditor’s reports and strategic information – Marketing data – NDA and Contract Documents – RND – Correspondence history and conversations with company management And a lot of other information. Some random files from the LIBYANA network are available here (TOR): LINK REDACTED BY REDPACKET SECURITY LIBYANA has 72 hours to contact us and follow our instructions. If they do not contact us in the specified time or ignore this message, they will be charged with additional activity: – This blog will be published on our platform and accessible to thousands of journalists cleaning us (for 72 hours since the attack, this blog is private and accessible only to LIBYANA through their personal link). – Confidential data will be made publicly available without the possibility of deletion. – NDA and strategy documents of the company will be published on additional resources – There will be an additional distribution to the major media outlets in the suburbs of the incident and proof of LIBYANA’s guilt in the leak and the lack of actions to stop the events – Personal, passport, payment and identity data will be used for criminal purposes and money laundering – There will be additional powerful attacks on LIBYANA business – All of the correspondence of LIBYANA’s management and its internal business information will be sent to the competitors LIBYANA has 72 hours to protect their data and contact us. Also LIBYANA has a unique chance to learn about all the skills and abilities of its network from us as professionals in the field if they comply with the conditions described above. Otherwise, LIBYANA’s bm business and reputation will be subject to additional attacks.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.