[NIGHTSPIRE] – Ransomware Victim: Vascara, Vietnam
![[NIGHTSPIRE] - Ransomware Victim: Vascara, Vietnam 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the NIGHTSPIRE Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The leak post attributes the incident to the ransomware group Nightspire and concerns Vascara, Vietnam, a company listed in the Consumer Services sector. The post date provided in the data is 2025-11-11 01:41:17.046720, and because there is no separate compromise date available, this timestamp should be treated as the leak post date. The dataset does not specify the impact of the attack (e.g., whether systems were encrypted or data was exfiltrated) nor any ransom figures. The description field merely repeats the victim name, and there is no additional contextual text to indicate the scope of the incident. Overall, the data do not reveal whether the breach involved encryption, exfiltration, or any other concrete impact beyond the attribution to Nightspire.
Evidence of media or a data dump is absent in the provided data. The record shows no downloads, no images or screenshots, and no links or claim URLs (downloads_present: false; images_count: 0; link_count: 0). The annotations section likewise contains no images or links, and the body excerpt is empty. Consequently, there are no visible screenshots or internal documents referenced, and the page offers only the nominal victim identity and actor attribution without corroborating material about the breach’s severity or any stated ransom.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
