[ELDORADO] – Ransomware Victim: CelPlan Technologies, Inc[.]

image

Ransomware Group: ELDORADO

VICTIM NAME: CelPlan Technologies, Inc[.]

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the ELDORADO Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The leaked information pertains to CelPlan Technologies, Inc., a company operating in the technology sector focused on providing radio frequency (RF) planning and optimization tools. As of the leak, the company reported a revenue of approximately $51.8 million and offers a range of services including consulting, engineering, and training specifically tailored for the wireless industry. The ransomware group associated with this breach is known as ElDorado. The content was discovered on November 18, 2024, and highlights that the leak comes at a time when cyberattacks continue to pose significant risks to organizations across various sectors, especially in technology.

No specific details were outlined regarding the nature of the compromised data, but there are indications that some user data may have been exposed, as suggested by the mention of “users” and “users_url” in the information extracted. Additionally, the page may provide links for download or access to the exposed data, although these have not been disclosed here. The absence of additional sensitive information points to an effort to maintain the anonymity of affected individuals and organizations. Stakeholders are advised to remain vigilant and take appropriate measures in response to this incident.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.