[DIREWOLF] – Ransomware Victim: DataPost
![[DIREWOLF] - Ransomware Victim: DataPost 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: DIREWOLF
VICTIM NAME: DataPost
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the DIREWOLF Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak page pertains to DataPost Pte Ltd, a prominent provider of data handling solutions based in Singapore. The attack date is recorded as May 26, 2025. The company specializes in secure e-invoicing and privacy services within the technology sector. The leak was discovered on May 27, 2025, indicating the breach’s recent occurrence. The page includes a screenshot depicting internal information, highlighting the severity of the breach. The attackers claim to have exfiltrated data related to the victim, with download links or data leaks indicated as present. The involved threat group is identified as “direwolf,” and the attack used various infostealers, including Lumma, Raccoon, and RedLine, suggesting targeted data theft and system compromise. No specific personally identifiable information or sensitive company details are disclosed publicly. The incident underscores the ongoing threat landscape faced by technology service providers, especially those managing sensitive data, and emphasizes the importance of cybersecurity measures. The company’s country of operation is Singapore, and they serve clients within the data privacy and e-invoicing industry. The breach appears to involve multiple malicious tools and personnel, indicating a coordinated attack effort. Further investigations are ongoing.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.