[FUNKSEC] – Ransomware Victim: avtovelomoto[.]by

image

Ransomware Group: FUNKSEC

VICTIM NAME: avtovelomoto[.]by

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the FUNKSEC Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page pertains to the victim site, avtovelomoto.by, which is associated with Technoagro LLC, a multi-brand company that caters to various client needs across several sectors including motor vehicles, water technology, agricultural technology, and bicycles. This business operates primarily in the CIS region, with locations in major Belarusian cities such as Minsk, Gomel, Mogilev, and Brest. The leak emphasizes the company’s commitment to customer experience and its solid reputation within these sectors, highlighting the central role of client satisfaction in their operational philosophy.

The content extracted from the leak reveals that significant data has been compromised, with reports indicating that sensitive information such as phone numbers, profile pictures, Gmail addresses, full names, and financial documents in PDF and Excel formats have been exfiltrated. The data status is described as “Encypted & Exfiltrated,” suggesting that the attackers have both encrypted their own communications with the victim and extracted a considerable volume of client and company information. Notably, there are no download links present on this page, but the presence of seven images implies visual documentation or evidence could support the claims made by the attackers.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.