[BLACKLOCK] – Ransomware Victim: Olivera Canarias

image

Ransomware Group: BLACKLOCK

VICTIM NAME: Olivera Canarias

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the BLACKLOCK Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The recent ransomware leak involves a company based in Spain, operating within the architecture, engineering, and design industry. The organization has a relatively small workforce, with fewer than 25 employees, and specializes in the supply of industrial products, maintaining a stock of over 15,000 references. The reported attack date is June 24, 2025, indicating a planned or ongoing compromise. The compromised company has an annual revenue of less than five million dollars. Sensitive data may have been accessed or extracted, as suggested by the leak of information via a designated data URL on the dark web. The incident is linked to a threat group identified as “blacklock,” known for their infostealer activities.

The leak page features a link to download data related to the victim company, which may include internal documents or business information. Visual content such as screenshots has not been provided, but the presence of a dedicated URL indicates data exfiltration. The compromised entity appears to have limited exposure to third-party threats, based on available infostealer statistics. The attack was discovered shortly after it occurred, suggesting active threat intelligence monitoring. The information indicates a targeted attack on a small, industrial supplier in Spain, with potential for further data dissemination or business impact if the breach is not contained. No personal or sensitive PII has been disclosed in the summary to maintain confidentiality and professionalism.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.