[DIREWOLF] – Ransomware Victim: Bolt Nut Manufacturing

image

Ransomware Group: DIREWOLF

VICTIM NAME: Bolt Nut Manufacturing

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the DIREWOLF Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

On August 25, 2025, a ransomware leak page attributed to the threat actor Dire Wolf claimed to have compromised Bolt Nut Manufacturing, a United Kingdom-based company operating in the Building Materials sub-sector of the manufacturing industry. The post frames the incident as a data-leak event rather than a pure encryption incident, citing approximately 50 GB of exfiltrated data and directing readers to a file distribution site hosted on an onion service. The page lists an official office website for the victim (defanged as hxxp://bnml[.]co[.]uk) and includes a copyright line attributing the post to Dire Wolf (© 2025 Dire Wolf). No ransom amount or explicit demand is disclosed within the post text.

The leak page contains no accompanying screenshots or images (the leak page metadata records zero images). It highlights victim identifiers—Bolt Nut Manufacturing—along with country (United Kingdom) and industry (Building Materials). It references a data footprint of 50 GB and points to a file distribution site hosted on a Tor onion service (defanged as The published item is dated August 25, 2025, which serves as the post date because no explicit compromise date is provided. The page bears the © 2025 Dire Wolf attribution, and there is no explicit ransom figure stated on the post.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.