[PARSE] – Ransomware Victim: SystemExec Co[.], Ltd[.]
![[PARSE] - Ransomware Victim: SystemExec Co[.], Ltd[.] 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: PARSE
VICTIM NAME: SystemExec Co[.], Ltd[.]
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the PARSE Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On August 26, 2025, SystemExec Co., Ltd. (システムエグゼ) is identified as the victim in a leak post describing a GitLab naked repository leak, with an asserted exposure of approximately 30 GB of data. The post date is 2025-08-26 14:43:39 UTC. The incident is characterized as a data leak rather than encryption, and there is no ransom amount or demand disclosed in the available data. A claim URL is indicated as present for further action, but the actual link is not included in this summary. The leak page contains no screenshots or images, and the body excerpt includes a gating message: “Please wait a few seconds. Once this check is complete, the website will open automatically.”
Metadata from the leak page references a redacted IP address and a request ID, along with a timestamp of 2025-08-26 15:01:02 UTC. The post asserts that roughly 30 GB of data from SystemExec Co., Ltd.’s GitLab repository has been exposed, described as a GitLab naked repo leak. There are no images or downloadable attachments listed on the page. A claim URL is present for potential follow-up, though the specific address is not shown. The company name appears in both English and Japanese (システムエグゼ), reinforcing the victim’s identity. Overall, the post frames the event as a data-exfiltration incident tied to a publicly accessible GitLab repository and was published on August 26, 2025.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.