[EVEREST] – Ransomware Victim: Dublin Airport
![[EVEREST] - Ransomware Victim: Dublin Airport 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the EVEREST Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On October 26, 2025, Dublin Airport, an international airport in Ireland operated by the Dublin Airport Authority, appeared on a ransomware leak page attributed to the Everest group. The post presents Dublin Airport as a victim of a breach and frames the incident as a data-leak event in which sensitive information has allegedly been stolen by the attackers. The description emphasizes Dublin Airport’s status as a major European hub—serving more than 180 destinations with over 40 airlines—and notes the post provides a claim URL consistent with ransomware double-extortion patterns. No explicit compromise date is stated on the leak page; as such, the post date serves as the reference timestamp for the incident. There is no specific ransom amount disclosed in the accessible content.
Regarding visuals, the leak page includes two screenshots or images intended to corroborate the attackers’ claims. The content of these images is not described in the available text. PII such as emails, phone numbers, and addresses has been redacted in this summary, while the victim name—Dublin Airport—remains. The visible content does not explicitly state whether Dublin Airport’s systems were encrypted or whether the impact is solely a data-leak scenario, and no ransom figure is provided within the post. The two images suggest the attackers supplied some form of internal material as part of their leak narrative, though the exact nature of the material is not defined in the provided data.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
