[FOG] – Ransomware Victim: Pamrya[.]de

image

Ransomware Group: FOG

VICTIM NAME: Pamrya[.]de

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the FOG Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page relevant to Pamyra.de indicates that the platform, which serves as a comparison tool for shipping services, has experienced a data breach. The leak was discovered on February 16, 2025, and it showcases the exposure of user data which includes information from approximately 50 users, as disclosed by the associated infostealer metrics. Pamyra.de functions as a valuable resource by connecting users with over 600 vetted freight companies, allowing for enhanced shipping service options. The presence of user data exposure raises significant concerns regarding the privacy and security of those who utilize the platform’s services.

The leak page also includes a screenshot summarizing the incident, providing a general overview of the breach’s details without exposing sensitive content. The website, registered in Germany, aims to facilitate shipping comparisons, but this incident may hinder user trust and reflect negatively on its operational integrity. The post includes links to the data leaked but does not specify any direct download options. Concerns about potential ramifications from this breach, including identity theft or unauthorized account access, cannot be dismissed considering the nature of the information made available through such ransomware attacks.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.