[BABUK] – Ransomware Victim: www[.]computan[.]com

image

Ransomware Group: BABUK

VICTIM NAME: www[.]computan[.]com

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the BABUK Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page details that the victim, known as Computan, operates within the Software as a Service (SaaS) industry. The attackers claim to have successfully infiltrated Computan’s network, resulting in unauthorized access to sensitive customer information, documents, and financial records associated with the companies using their services. The hackers have threatened to leak all acquired data, which potentially includes Personally Identifiable Information (PII), unless a specified ransom is paid within a set timeframe. The mention of a ransom emphasizes the serious risk to the data of numerous entities hosted in Computan’s infrastructure.

According to the post, there were 844 views recorded, indicating interest or concern among potential viewers. There are no download links or images associated with the leak, but the implication of serious data theft and the threat of a public release of sensitive data underscores the potential impact of this ransomware attack on Computan and its clients. The attackers have positioned the urgency of their demands clearly, leaving no ambiguity about the repercussions of non-compliance. Protecting customer information is critical, and the potential breach poses significant risks for victims if the ransom is not addressed effectively and promptly.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.