[DIREWOLF] – Ransomware Victim: International Freight & Commerce
![[DIREWOLF] - Ransomware Victim: International Freight & Commerce 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: DIREWOLF
VICTIM NAME: International Freight & Commerce
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the DIREWOLF Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
International Freight & Commerce, a Transportation/Logistics company based in Tunisia (TN), is listed as the victim in this leak post. The post is dated August 17, 2025 at 06:08:25 UTC, which is treated as the publication date in the absence of a separately documented compromise date. The leak page is associated with a ransomware operation linked to the direwolf group and includes a claim URL, indicating the attackers publicly claim access to the victim’s data. The metadata does not explicitly designate the incident as encrypted or as a data leak, nor does it disclose a ransom amount. The snapshot shows no downloads and no images or media attached to the leak page.
From the provided data, the leak page presents limited detail beyond the victim’s name and industry. The presence of a claim URL suggests a data-exfiltration narrative, but there is no explicit ransom figure documented in the dataset, and no compromise date separate from the post date is recorded. The page records zero images or screenshots and no downloadable files, indicating a minimal media footprint in the snapshot. Without additional indicators, the precise scope of affected data or systems remains unclear, though the post aligns with a pattern where threat actors publicly announce breaches and offer data access via a claim URL.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.