[INTERLOCK] – Ransomware Victim: North Stonington Elementary School

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the INTERLOCK Onion Dark Web Tor Blog page.

Ransomware group:
INTERLOCK
Victim name:
NORTH STONINGTON ELEMENTARY SCHOOL

AI Generated Summary of the Ransomware Leak Page

On October 13, 2025 at 13:17:14.652100, a ransomware leak post identifies North Stonington Elementary School, a United States–based educational institution, as a victim. The post attributes the incident to the Interlock group and centers on a web‑based file management tool described as Tiny File Manager. The attackers claim they gained access to the school’s environment and exfiltrated data, and the page provides a claim URL for additional details. The post date is the leak publication date; there is no separate compromise date listed in the data. The leak page contains no visible screenshots or downloadable content, and there are no images or links enumerated in the metadata. No ransom amount or demand is disclosed in the available data. The victim name remains North Stonington Elementary School, with other organizational names not foregrounded in this summary.

The page text includes a body excerpt such as “Item Type Item Name Search file in folder and subfolders…,” which suggests the attackers are presenting or referencing a file inventory and directory search capability tied to the compromised environment. The description emphasizes a web‑based PHP file management interface, specifically Tiny File Manager, which the leak appears to implicate in the incident. A claim URL is indicated on the page, though the exact link is not shown here. The page shows no screenshots, downloadable files, images, or additional attachments, and no ransom figure is provided in the data. The incident is attributed to the Interlock group, affecting a US education institution, with the victim’s name still North Stonington Elementary School; no other company names are highlighted in this record.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features