[DIREWOLF] – Ransomware Victim: 台灣東洋國際儀表股份有限公司
![[DIREWOLF] - Ransomware Victim: 台灣東洋國際儀表股份有限公司 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: DIREWOLF
VICTIM NAME: 台灣東洋國際儀表股份有限公司
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the DIREWOLF Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On August 25, 2025, the ransomware leak post attributed to the Dire Wolf group concerns 台灣東洋國際儀表股份有限公司, a manufacturing company based in Taiwan. The page frames the incident as a data-leak event rather than full encryption, and the victim is identified by the Chinese name on the leak page. No compromise date is publicly listed; the post date (2025-08-25 13:40:53.646105) is the reference timestamp. The attackers claim to have exfiltrated a data package described as 9 GB in size, including Financial Data and Sales Data. The leak notes that sample files and a file list were published on the post date, with all documents slated for release on 2025-09-10. A claim URL is indicated for verification, and a File Distribution Site on the Tor network is listed (defanged here as a Tor address). The post contains no explicit ransom demand and there are no embedded screenshots or images described in the available data (the record shows zero image attachments).
The page’s presentation attributes the operation to the threat actor group Dire Wolf and centers on the victim in the manufacturing sector. The data package is described as 9 GB and includes categories such as Financial Data and Sales Data, suggesting targeted corporate information rather than a system-wide encryption claim. The release cadence is noted as two milestones: sample files and a file list published on 2025/08/25, followed by a release of all documents on 2025/09/10. A distribution channel is referenced via a Tor-based site (defanged here as and a claim URL is present for verification purposes. There are no screenshots or images shown on the leak page, and no ransom amount is displayed in the excerpt, indicating a data-leak narrative rather than a public encryption event with a monetary demand.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.