LockBit 3.0 Ransomware Victim: metroappliancesandmore[.]com

image 11
LockBit 3.0 Ransomware

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the LockBit 3.0 Onion Dark Web Tor Blog page.

Victim Namemetroappliancesandmore[.]com
Victim Logo
(if available)
metroappliancesandmore com victim
DescriptionMETRO Appliances And More. Information from the open sources. Metro Appliances & More owns and operates retail sores and sells appliances such as dishwashers and dryers. Metro Appliances & More was founded in 1974. Metro Appliances & More’s headquarters is located in Tulsa, Oklahoma, USA 74146. Metro Appliances & More’s President, Guy Minnix, currently has an approval rating of 90%. Metro Appliances & More has an estimated 190 employees and an estimated annual revenue of >20.0M. Metro Appliances & More’s President, Guy Minnix, currently has an approval rating of 90%. Information from the official website. With 8 stores in four states, Metro Appliances & More has the buying power to offer the lowest possible price on more than 50 major brands of appliances. Whether you are a builder, contractor or homeowner, we have the products to meet your needs and your budget. Each of our locations provides an extensive display of products, many showcased in kitchen cabinetry. Our employee-owned company prides itself with expert salespeople who offer years of appliance sales experience and extraordinary customer service. STOLEN INFORMATION LIST. 1. Customer information, payment details, credit cards, delivery data, phone numbers, e-mails (in some cases, customer documents include various types of insurance, and other confidential information). 2. Up-to-date information about the company’s employees, includes a full package of documents (insurance, ID, driver’s license, social security numbers, private phone numbers, private e-mails, employee profiles with personal signatures), scans of various documents, includes reports of traffic accidents, information about bonuses and travel expenses, etc. 3. A lot of operational information extracted from SQL databases 4. A wide range of information for official use, annual reports, development programs, negotiations, information about partners, corporate mail archives. With regards. LOCKBIT Team. *Information for customers affected by the negligence of company employees: all claims on data that will be made public, please send to the specified contact details. Jonesboro, AR : (870) 933-7800 Lowell, AR : (479) 750-2200 North Little Rock, AR : (501) 758-1988 Wichita, KS : (316) 941-4040 Joplin, MO : (417) 782-1008 Springfield, MO : (417) 833-1113 Oklahoma City, OK : (405) 787-7400 Tulsa, OK : (918) 622-7692 Social networks. twitter.com/MetroAppliances facebook.com/MetroAppliancesAndMore youtube.com/user/MetroAppliance **The first stage of the auction takes place in private mode (calculated on the consciousness of the company whose data is published, as well as on our special clients in the field of information), then some of the data is published in the public domain and open auctions begin.
Uploaded Date27 Jun, 2022 16:12 UTC
Dark Web Post Updated28 Jun, 2022 12:42 UTC
Publish Date of Files if Ransom is not Paid18 Jul, 2022 13:25:34 UTC
WarningAll available data will be published !
Cost to Extend Deadline by 24 holurs($10000 USD)
Cost to Destroy All Information($ 300000 USD)
Cost to Download the Data at Any moment($ 300000 USD)


Countdown Timer as shown on the LockBit Blog

Until files
published

To get additional information, please download the Tor Browser and then visit the onion site located here:
(to defang, remove the [.] and replace with . Also change hXXp to http)

You can then copy and paste it into the Tor browser to get updates regarding this victim of Lockbit 3.0 Ransomware

Onion Site URL:
h XX p://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd[.]onion


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, support us on Patreon using the button below

Digital Patreon Wordmark FieryCoralv2

Join the telegram channel

join