[ANUBIS] – Ransomware Victim: Grand Rapids Controls
![[ANUBIS] - Ransomware Victim: Grand Rapids Controls 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: ANUBIS
VICTIM NAME: Grand Rapids Controls
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the ANUBIS Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
Grand Rapids Controls, a United States–based manufacturer specializing in motion control systems, including mechanical and electromechanical cables, handles, and actuators, is identified as the victim on the leak page. The post describes a data-leak event involving a 150 GB cache of confidential documents and NDA agreements with multiple clients. It is presented as a public disclosure on the attackers’ leak site, indicating that sensitive internal data has been exfiltrated rather than encrypted in the traditional sense. The date associated with the post is August 15, 2025; no separate compromise date is provided in the data, so this is treated as the post date. The leaked materials are characterized as blueprints and internal documents, including incident reports, financial records, and administrative files, all described as confidential. The page notes nine images are included as visual evidence, described in general terms as screenshots of internal materials.
The leak page indicates a claim URL is present, suggesting a point of contact or negotiation for the attackers, though no ransom amount or terms are provided in the available data. The content emphasizes a substantial data exfiltration (the 150 GB cache) rather than an encryption of operational systems, and the accompanying visuals (nine images) are presented to corroborate the leak. The materials cited include blueprints and internal documents such as incident reports, financial records, and administrative files, all labeled confidential. For privacy and safety, no personal identifiers are disclosed in this summary, and any sensitive information within the leaked materials should be treated as redacted until verified otherwise.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.