[DIREWOLF] – Ransomware Victim: Dynacast

image

Ransomware Group: DIREWOLF

VICTIM NAME: Dynacast

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the DIREWOLF Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

On August 25, 2025, a ransomware leak page associated with the Dire Wolf group published details about a breach affecting Dynacast, a United States-based global manufacturer of engineered metal components. The victim operates in the Manufacturing industry and, per the page, has a long history dating to 1936 with more than 20 manufacturing facilities across more than a dozen countries. The page identifies Dynacast as a victim and frames the incident as a data-leak event consistent with ransomware double-extortion patterns where attackers claim to have exfiltrated sensitive data and threaten its public release. For context, the page references the victim’s official site at hxxp://www[.]Dynacast[[.]]com[.] The post date, as listed, is August 25, 2025.

According to the excerpt, the leak page lists a data package of 66 GB and directs readers to a data distribution site hosted on the onion network for potential access to the exfiltrated material. A claim URL is indicated on the page, suggesting a link to the data in question, though no explicit ransom amount is shown in the snippet. Visual content on the page is not present—no images or screenshots are included—while the onion distribution address is referenced at This pattern aligns with ongoing ransomware activity targeting manufacturing companies and underscores the risk of large-scale data leaks in the sector.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.