[INCRANSOM] – Ransomware Victim: dwgra[.]com

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the INCRANSOM Onion Dark Web Tor Blog page.

Ransomware group:
INCRANSOM
Victim name:
DWGRA[.]COM

AI Generated Summary of the Ransomware Leak Page

On October 26, 2025, a leak page associated with the victim domain dwgra[.]com appeared under the incransom ransomware umbrella. The post frames the incident as a data-leak event, claiming that the attackers have obtained sensitive corporate information from the victim’s network. The materials alleged to be in play include fiscal data, internal email communications, employee records, and strategic development plans. There is no explicit ransom demand or amount provided in the data. In the absence of a disclosed compromise date, the post date is treated as the publication date of the leak. The metadata lists the victim’s industry as Not Found, and the narrative centers on the victim domain rather than naming other external entities.

According to the available metadata, the leak page contains no visual artifacts: there are zero images or screenshots, and no downloadable files or links are listed. This suggests a text-focused post in the provided data. If the attacker claims are accurate, the alleged exfiltration of fiscal data, internal mail, and employee records—along with strategic development plans—would present substantial privacy and regulatory risks for the organization associated with dwgra[.]com. The post date remains October 26, 2025, serving as the publication date in lieu of any disclosed compromise date.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features