[DRAGONFORCE] – Ransomware Victim: Iris ID
![[DRAGONFORCE] - Ransomware Victim: Iris ID 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: DRAGONFORCE
VICTIM NAME: Iris ID
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the DRAGONFORCE Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak pertains to Iris ID Systems, a company specializing in iris recognition technology, facial recognition, and access control solutions. The breach was publicly disclosed following an attack on April 16, 2025, with the leak being discovered on April 20, 2025. The breach affects the company’s operations in the United States, where it is headquartered in Cranbury, New Jersey. The leak appears to include sensitive data and internal information related to the company’s technology and operations, which has been made available on the dark web by the threat group identified as ‘dragonforce.’ The leak page contains a screenshot indicating the data compromised, although specific details of the data are not provided publicly. No particular PII or customer information is explicitly mentioned in the details provided, but the leak could potentially include proprietary information or internal documents.
The group responsible for the leak appears to have uploaded the data to an underground site, with a claim URL provided as part of the leak announcement. The leak’s public listing suggests that the group may have targeted the company’s technological and identification systems, possibly aiming for extortion or data disclosure purposes. The threat actors often include screenshots or samples of the compromised data to demonstrate the breach’s legitimacy. This incident highlights the ongoing cyber threats facing technology companies, especially those handling sensitive biometric data. Companies like Iris ID Systems must emphasize cybersecurity measures to protect their proprietary assets and client information from similar attacks in the future.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.