[DRAGONFORCE] – Ransomware Victim: Pratt Homes

image

Ransomware Group: DRAGONFORCE

VICTIM NAME: Pratt Homes

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the DRAGONFORCE Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page pertains to Pratt Homes, a construction company based in Canada that specializes in home building and development. The attack was publicly disclosed on April 16, 2025, with the attack date recorded as April 14, 2025. The company has a long-standing history dating back to 1973, highlighting its growth from a family-run business into a significant regional developer known for high-quality construction and customer satisfaction. The leak includes visual content such as a screenshot displaying internal images, which may contain sensitive operational details, though specific contents are not described here. No personally identifiable or sensitive employee data is indicated as compromised, but the leak highlights potential exposure of proprietary information related to the construction projects. Download links or leaked data are implied, and the breach appears to be associated with a known threat group.

The company’s profile emphasizes its extensive portfolio, including the development of residential homes, condominiums, and large-scale housing projects in the White Bear Lake area. The publicly leaked information may include sensitive files or documents that could impact the company’s operations, reputation, or client trust. The breach was part of a broader campaign by the threat actor group “dragonforce,” noted for infostealer activities, although no specific data on the extent or exact nature of the data leak is provided. The breach underscores the importance of cybersecurity measures in the construction industry, especially given the potential risks posed by such attacks on proprietary project plans, client data, or operational procedures.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.