[BLACKNEVAS] – Ransomware Victim: Trojan Construction & Holding Group
![[BLACKNEVAS] - Ransomware Victim: Trojan Construction & Holding Group 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the BLACKNEVAS Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On October 21, 2025 at 13:06:37, a leak page attributed to the ransomware group blacknevas claimed a breach of Trojan Construction & Holding Group, a UAE‑based construction company with a broad project portfolio. The post frames the incident as a data-leak event rather than a pure encryption incident and asserts that more than 3 terabytes of project and financial reporting data from 2024–2025 were exfiltrated. To illustrate the scale, the page provides a defanged link to a file-sharing site: hxxp://gofile[.]io/d/4Uf42V. A contact email is listed for those interested in purchasing the data; in this summary, that address has been redacted. The leak page also offers background context describing Trojan Construction & Holding Group as a major Abu Dhabi–based contractor, though the focus for this summary remains on the victim entity. The post date is 2025-10-21 13:06:37, and no explicit compromise date is provided on the page, so this timestamp is treated as the post date.
Regarding visuals, the leak entry contains no screenshots or images; it relies on textual claims plus the defanged data link and a sales invitation. The primary claim is the exfiltration of over 3 TB of 2024–2025 project and financial reporting data, with no ransom amount disclosed on the page. This presentation aligns with common ransomware double-extortion patterns in which attackers monetize stolen data and offer samples for sale. The contact channel for negotiations is redacted in this summary. The page remains focused on the victim entity, and any other corporate names that appear in the surrounding text are outside the scope of this summary. Readers should treat this as a data-leak incident and consider independent verification of the dataset’s scope, provenance, and potential impact on operations and risk management.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
