HIVE Ransomware Victim: Exela Technologies
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the HIVE Onion Dark Web Tor Blog page
Company Info
- Company Name:
Exela Technologies - Company Website:
www[.]exelatech[.]com
Dark Web Info
- Date Encrypted:
20June 2022 – 02:39:30 - Disclosed Date:
07/13/2022 - Files available to download:
Yes files are available to download
Description
- Exela is a business process automation (BPA) leader, leveraging a global footprint and proprietary technology to provide digital transformation solutions enhancing quality, productivity, and end-user experience. With decades of expertise operating mission-critical processes, Exela serves a growing roster of more than 4,000 customers throughout 50 countries, including over 60% of the Fortune® 100. With foundational technologies spanning information management, workflow automation, and integrated communications, Exela’s software and services include multi-industry department solution suites addressing finance & accounting, human capital management, and legal management, as well as industry-specific solutions for banking, healthcare, insurance, and public sectors. – Through cloud-enabled platforms, built on a configurable stack of automation modules, and 17,500+ employees operating in 23 countries, Exela rapidly deploys integrated technology and operations as an end-to-end digital journey partner. NASDAQ: XELA
To get additional information, please download the Tor Browser and then visit the onion site located here:
(to defang, remove the [.] and replace with. Also, change hXXp to http)
h XX p://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd[.]onion
You can then copy and paste it into the Tor browser to get updates regarding this victim of the HIVE Ransomware
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon using the button below
To keep up to date follow us on the below channels.