[CACTUS] – Ransomware Victim: newhorizonsbaking[.]com
![[CACTUS] - Ransomware Victim: newhorizonsbaking[.]com 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: CACTUS
VICTIM NAME: newhorizonsbaking[.]com
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the CACTUS Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
New Horizons Baking has been identified as a victim of a ransomware attack, with the leak page claiming to contain a substantial amount of data, approximately 455GB. The company, which specializes in producing hamburger buns and English muffins, prides itself on delivering high-quality bakery products for a broad customer base. Based in Norwalk, Ohio, the organization reportedly generates annual revenues of around $163 million. However, the specifics of the data published on the leak page include a variety of critical documents related to corporate operations, though no Personally Identifiable Information (PII) from customers or employees was disclosed directly on the page.
The information on the leak page indicates that the types of data potentially compromised include corporate documents, confidential agreements, human resources material, and financial records. This incident underscores the significant risk to businesses in the food and beverage sector regarding data security and the potential impact of ransom-related data leaks. While download links were mentioned within the context of file access, they were not available for direct usage as per the latest update. The presence of six images suggests that visual evidence may have been included, likely reflecting sensitive documentation or data archives relevant to the breach.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.