NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the ALPHV Onion Dark Web Tor Blog page
- Company Name:
- Victim Logo URL:
Dark Web Info
- Date Listed:
- Screenshots Available:
- Files available to download:
- Who is Grupo NGN Grupo NGN, Inc. is an Contact Center software developer (CCaaS) which was formed in August of 2014 as a successor company to SCS Inc., itself founded in 1987. Headquarters: 11555 Heron Bay Blvd 200, Coral Springs, Florida, 33076, United States Phone Number: (815) 986-2690 Website: www.grupongn.com Revenue: $10M Facebook: www.facebook.com/grupoteleservices Linkedin: LINK REDACTED BY REDPACKET SECURITY Grupo NGN have a critically low level of data protection of their company and their clients, thanks to which we obtained more than 200GB of valuable data, among which: – Source codes of Grupo NGN’s software and developments – Client conversations records – Internal documentation – NDA documentation – Documents and contracts – Personal Data – Databases and SQL And much more. If Grupo NGN will not contact us and resolve the issue of recovery and protection of their data within 48 hours, the following actions will take place: – All customer data, their phone records and other documents will be released to the public – All clients will be notified that Grupo NGN will be exposing their confidential data, phone records and other documents – Journalists and major media outlets will be given detailed information about the incident and proof of Grupo NGN’s guilt and their negative attitude towards protecting their clients’ data – All accesses to the network vulnerabilities of Grupo NGN and their clients will be published in the dark forums on behalf of Grupo NGN, which will lead to further attacks. Changing passwords and accesses won’t help avoid it – All internal documentation and source codes of Grupo NGN developments will be publicly available and accessible to anyone
Onion Site Indicator Of Compromise (IOC):
h XX p://[.]onion
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon using the button below
To keep up to date follow us on the below channels.