LockBit 2.0 Ransomware Victim: hinakaorg[.]com

lockbit logo
LockBit 2.0 Ransomware

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the LockBit 2.0 Onion Dark Web Tor Blog page.

Victim Namehinakaorg[.]com
Victim Logo
(if available)
hinakaorg com victim
Description1,5 Gb of company data HINAKA Fluid Power CO.,LTD, “HINAKA”, founded in 1988, established its own brand and self-emerged designs for the evolution of new high-quality pneumatic and hydraulic components. In addition to an exceptional design team, HINAKA tailored its own manufacturing, assembly, service, and quality control departments. HINAKA has over 30 years experience with pneumatic and hydraulic drives having its first production at the time of the initiation of the Japanese Technical Cooperative. Over 100 kinds of products have been launched with domestic and international patents obtained.
Number of Leaked Files
(at time of posting)
0/3520
Publish Date of Files if Ransom is not Paid23 May, 2022 07:29:00
WarningAll available data will be published !


Countdown Timer as shown on the LockBit Blog

Until files
published

To get additional information, please download the Tor Browser and then visit the onion site located here:
(to defang, remove the [.] and replace with . Also change hXXp to http)

You can then copy and paste it into the Tor browser to get updates regarding this victim of Lockbit Ransomware

Onion Site URL:
hXXp://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd[.]onion'