[DRAGONFORCE] – Ransomware Victim: Egaraset

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the DRAGONFORCE Onion Dark Web Tor Blog page.

Ransomware group:
DRAGONFORCE
Victim name:
EGARASET

AI Generated Summary of the Ransomware Leak Page

On October 20, 2025, a leak page associated with the victim Egaraset appeared as part of a ransomware post. Egaraset is described as an IT solutions provider offering adaptable and flexible services for small and medium enterprises (SMEs) and religious congregations. With more than 20 years of experience, the company claims to serve over 400 companies and 1,000 communities worldwide, providing offerings such as ERP, financial management, and customer relationship management to improve efficiency. The leak post includes a claim URL, which aligns with typical ransomware activity. The available data do not specify whether the attackers claim encryption of systems, a data leak, or both, and no ransom amount is disclosed in the fields provided.

The post date recorded in the data is 2025-10-20 09:35:19.063347, and in the absence of a separate compromise date, this timestamp is treated as the post date for the leak entry. The page shows no visual material—there are zero images or screenshots and no downloadable files listed. The content focuses on describing Egaraset’s business and capabilities rather than presenting concrete samples of stolen data. The description reiterates Egaraset’s focus on ERP, financial management, and CRM, highlighting a worldwide client base, but it does not provide explicit data types, volumes, or encryption status within the public portion of the leak page.

Metadata indicates the industry field as Not Found, but the descriptive text provides a clear view of Egaraset’s IT services orientation for SMEs and religious communities. No ransom figure is provided in the available data. The presence of a claim URL suggests potential extortion or public data-release messaging typical of ransomware leaks, yet there are no visible data exfiltration indicators or sample documents in the extract. Observers should monitor for any follow-on communications and verify Egaraset’s publicly known business profile to assess risk to current clients and partners.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features