[KILLSEC] – Ransomware Victim: iCare Software

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the KILLSEC Onion Dark Web Tor Blog page.

Ransomware group:
KILLSEC
Victim name:
ICARE SOFTWARE

AI Generated Summary of the Ransomware Leak Page

On 2025-10-23 16:18:23.852880, a leak post attributed to the ransomware group killsec identifies iCare Software as a victim. iCare Software is described as a United States–based technology company that delivers management solutions for childcare and afterschool programs. The company serves childcare centers, preschools, afterschool programs, and multi-site operations, automating tasks such as attendance tracking, staff scheduling, tuition collection, and compliance reporting. The description notes that iCare offers AI-driven analytics, business intelligence dashboards, and CRM tools designed to boost enrollment and staff retention, and highlights seamless data migration along with a robust back-end to support providers. The post indicates that iCare Software was compromised, but the available data do not specify whether the attackers encrypted systems or exfiltrated data, and no ransom figure is disclosed. Since no separate compromise date is provided in the dataset, the timestamp is treated as the post date.

Regarding media on the leak page, the provided data indicate no screenshots or images and no downloadable files. This suggests the page functions primarily as a victim profile rather than a full data dump. The victim name remains iCare Software, with other company names mentioned in the text not reproduced here, and any potential PII has been redacted. No URLs or contact details are included in the dataset for defanging or verification, and there is no evidence of published ransom demands in the supplied information.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features