[BLACKBYTE] – Ransomware Victim: GreenLight Biosciences

image

Ransomware Group: BLACKBYTE

VICTIM NAME: GreenLight Biosciences

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the BLACKBYTE Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak was discovered on July 16, 2025, targeting GreenLight Biosciences, a biotechnology company based in Medford, Massachusetts, in the United States. This company specializes in synthetic biology and RNA production, serving high-tech and scientific industries. The leak was associated with the BlackByte group, a known threat actor. The breach involved the release of some sensitive information, although specific details such as compromised data or files have not been publicly disclosed. Visual evidence or screenshots are not available, but the incident signals a significant security event for the organization, potentially exposing internal workflows or confidential research data.

Despite the lack of detailed leak content, the incident highlights ongoing cybersecurity challenges faced by organizations in the biotech sector. The attack date aligns with the current timeline, emphasizing the importance for businesses to reinforce their security measures. The leak may include stolen documents, proprietary information, or internal communications, but such details have not been shared publicly. The incident underscores the need for continuous monitoring and robust defenses against advanced threat groups like BlackByte, which target organizations across various sectors. No publicly available download links or explicit information about the content of the data leak have been reported, but the breach remains a concern for the affected company and its stakeholders.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.