[INCRANSOM] – Ransomware Victim: TMF Logistics
![[INCRANSOM] - Ransomware Victim: TMF Logistics 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the INCRANSOM Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
TMF Logistics, a Transportation/Logistics company based in Algeria (DZ), is identified as the victim in a ransomware leak post attributed to the actor group incransom. The leak post is dated 2025-10-31 11:14:00.000000, which is treated here as the post date. The page references a substantial exfiltration event, noting approximately 39,308,400,640 bytes of data allegedly stolen from TMF Logistics’ network (roughly 39.3 GB). A claim URL is present on the leak page, indicating the attackers provide a channel for ransom-related communications or claims, though the exact contents and terms are not provided in the dataset. The metadata does not explicitly label the impact as “Encrypted” or “Data leak,” but the claimed data volume supports a data-exfiltration narrative surrounding TMF Logistics.
The leak page contains no visual content; the metadata shows zero images or screenshots and no downloadable files or external links associated with the post. The presence of a claim URL suggests the attackers may intend to prompt ransom-related actions, but there are no visible details of any demanded amount in the provided data. The incident is centered on TMF Logistics in Algeria, within the Transportation/Logistics sector; no other company names are central to this summary beyond the identified victim.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
