[HANDALA] – Ransomware Victim: Niflaot Hatzuna Ltd
![[HANDALA] - Ransomware Victim: Niflaot Hatzuna Ltd 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: HANDALA
VICTIM NAME: Niflaot Hatzuna Ltd
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the HANDALA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak pertains to Niflaot Hatzuna Ltd, a company based in Israel that specializes in food service, logistics, and catering. The breach was discovered on July 4th, 2025, and the compromised data includes sensitive information such as procurement orders, delivery logs, and staff lists, indicating a significant exposure of internal operations. The company has been trusted to supply government buildings, detention centers, and other quiet facilities, making the data leak particularly concerning for national security and operational privacy. The leak suggests that the attackers gained access to detailed logistical and personnel information, which could be exploited for further malicious activities or intelligence gathering.
The leak page includes a screenshot illustrating the compromised data, which highlights the scope of the breach. No explicit mention of the presence of download links is provided, but the publication of such data on this leak site indicates that copies of internal documents and logs are accessible to the public. The attack date, recorded as July 4, 2025,, underscores the recent and ongoing nature of the breach. Given the sensitive nature of the leaked information and the company’s role in public service logistics, the incident raises concerns about potential disruptions and the security of government supply chains in Israel.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.