Haron Ransomware Victim: Westrup Company
NOTE: The information on this page is fully automated and scraped directly from the Haron .onion Dark Web Tor Blog page and reposted here for awareness.
Victim Name | Westrup Company |
Victim URL | www[.]westrup[.]com |
Total Post Views | Views: 5349 |
Victim Location | Sorøvej 21, 4200 Slagelse, Denmark |
Date post scraped by RedPacket Security | 11/3/2021 |
Next Update from Blog Threat Actors | Next update: 1 days from scrape date |
Additional Information | We have gained access to all servers on your network. At this point, all information on your servers has been encrypted. We also received all the information that you stored on servers and NAS storages. We have over 700GB of your documentation at our disposal. Personnel documents, ID passports, accounting documents, contracts, etc. If you do not contact us, all information will be publicly available. img-imgs/West2.png img-imgs/West1.png |
Screenshots posted | true |
Onion Site Victim Post URL | hXXp://midasbkic5eyfox4dhnijkzc7v7e4hpmsb2qgux7diqbpna4up4rtdad[.]onion/blog.php/blogs.php?id=19 |
To get additional information, please download the Tor Browser and then visit the onion site located here:
(to defang, remove the [.] and replace with. Also, change hXXp to HTTP)
You can then copy and paste it into the Tor browser to get updates regarding this victim of Haron Ransomware