[MEDUSA] – Ransomware Victim: Expert E-commerce GmbH
![[MEDUSA] - Ransomware Victim: Expert E-commerce GmbH 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: MEDUSA
VICTIM NAME: Expert E-commerce GmbH
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the MEDUSA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On August 17, 2025, a ransomware leak page identifies Expert E-commerce GmbH, a German company founded in 1999 and based in Langenhagen, Germany, as a victim. The organization operates in the technology sector, providing e-commerce services. The leak post claims that 114 GB of data were exfiltrated from Expert E-commerce GmbH’s network, framing the incident as a data-leak event rather than a pure encryption breach. The page also notes a claim URL for verification and gates access with a human verification captcha. There are no visible screenshots or image assets on the page, and no downloadable content is provided (the image count is zero). The publicly available text does not include an explicit ransom demand.
The post date serves as the disclosure date, with August 17, 2025 used due to the absence of a separate compromise date in the data. The leak page outlines a data loss of 114 GB but does not detail the data types involved, nor does it reveal a specific ransom amount in the provided text. The listing aligns with common ransomware data-leak patterns that threaten public release of stolen data and provide a negotiation link via a claim URL; however, the content remains limited, with no accompanying screenshots or documents for independent verification. The incident is associated with the Medusa threat group, while preserving the victim’s name exactly as provided: Expert E-commerce GmbH.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.