[LYNX] – Ransomware Victim: Maruichi Leavitt Pipe & Tube

image

Ransomware Group: LYNX

VICTIM NAME: Maruichi Leavitt Pipe & Tube

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the LYNX Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page pertains to an attack targeting the manufacturing company Maruichi Leavitt Pipe & Tube, based in the United States. The attack was disclosed on May 16, 2025, with the actual compromise occurring slightly earlier on May 6, 2025. The leak appears to include data related to the victim’s operational activities within the manufacturing sector. The page provides a public claim URL, indicating that the threat actors assert responsibility for the breach and are leaking stolen data as part of their extortion tactics. These leaks often include sensitive or internal documents which could compromise the company’s operational security and reputation.

The leak page features a screenshot that likely displays some of the compromised data, such as internal documents or communications, with the visual content serving to verify the leak’s authenticity. No specific details of the stolen data are provided here, but the presence of a claim URL and visual proof suggest the release of proprietary information. Although detailed contents are not visible in this summary, the leak emphasizes the seriousness of the breach and the threat posed to the victim’s manufacturing operations. The attack’s timing and the public nature of the leak underscore ongoing cybersecurity risks faced by industrial sectors in the US.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.