[EVEREST] – Ransomware Victim: Bitbox

image

Ransomware Group: EVEREST

VICTIM NAME: Bitbox

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the EVEREST Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

This ransomware leak page pertains to a technology company identified as Bitbox, which specializes in video game development. The disclosed attack occurred on July 26, 2025, with the breach publicly discovered on July 30, 2025. The company is based in Switzerland and is known for creating immersive, multiplayer sandbox games such as “Life is Feudal.” The leak includes visual evidence, such as a screenshot depicting internal information or related content, highlighting the severity of the breach. The compromised data likely involves internal communications or development details, though specific sensitive information has been redacted to protect individuals’ privacy. The attackers, associated with the Everest group, have made claims and provided a URL link for further verification, though no detailed data or files are openly shared in the public leak report. The incident underscores ongoing cybersecurity risks faced by technology and gaming companies, especially those involving proprietary creative assets and internal operations.

Additional information indicates the attack was part of a broader operation targeting the technology sector, with the group possibly leveraging ransomware to threaten data exfiltration or system disruption. The leak’s visual component, accessible via a provided screenshot, suggests that internal documentation or screenshots of proprietary systems may have been exposed, potentially threatening the company’s intellectual property. Despite the event being publicly disclosed, no specific individual or client data is visible in the leak summary. As with all such incidents, the focus remains on assessing the impact, preventing further breach attempts, and strengthening cybersecurity defenses. The event highlights the importance of comprehensive security measures for organizations handling complex digital assets and collaborative online environments.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.