[DRAGONFORCE] – Ransomware Victim: Autorotor

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the DRAGONFORCE Onion Dark Web Tor Blog page.

Ransomware group:
DRAGONFORCE
Victim name:
AUTOROTOR

AI Generated Summary of the Ransomware Leak Page

On October 14, 2025, a ransomware leak post attributed to the threat group dragonforce targets Autorotor, a manufacturing company based in Italy. Autorotor designs and builds custom machinery for factories and production plants, including rotating tables, transport belts, rings, and robotic handling equipment that help companies move and position products quickly and accurately. The leak post identifies Autorotor as a victim of a ransomware incident; however, the provided data does not specify whether the attackers encrypted systems, exfiltrated data, or both. The post does not disclose a ransom amount, and because there is no explicit compromise date provided in the leak metadata, the published time stamp is treated as the post date: 2025-10-14 13:15:23.655906. The page indicates a claim URL is present, which could imply a negotiation or instruction path, but the metadata offers no additional details or attachments. The victim’s country is noted as Italy, aligning with Autorotor’s described business context.

Based on the available metadata, there are no screenshots or images shown on the leak page (the page contains no downloadable files or visible attachments). The annotations record no images or external links, and there is no visible media content within the provided data. A claim URL is indicated as present, but the actual URL is not included in this summary. In short, the leak post presents Autorotor as a ransomware victim with an unspecified impact and a post-date timestamp, while providing no visible evidence such as sample documents or media in the supplied information.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features