[EVEREST] – Ransomware Victim: Katz & Doorakian Law Firm, P[.]L[.] – File tree upload
![[EVEREST] - Ransomware Victim: Katz & Doorakian Law Firm, P[.]L[.] - File tree upload 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: EVEREST
VICTIM NAME: Katz & Doorakian Law Firm, P[.]L[.] – File tree upload
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the EVEREST Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak page pertains to Katz & Doorakian Law Firm, P.L., a business services provider. The attack was officially reported on July 11, 2025, and the incident was discovered on July 12, 2025. The breach is linked to a group identified as “everest,” indicating a potentially organized cybercrime operation. The page includes a screenshot of internal documents or a user interface that appears related to the victim’s data environment.
Despite limited specific details, the page suggests data exfiltration or compromise of sensitive legal documents. It provides a claim URL on the Tor network, which visitors can access to verify or learn more about the leak. The presence of a file tree upload indicates that substantial data or structured information may have been accessed or leaked. As of now, no explicit PII or sensitive client information is displayed publicly, but the data involved could include confidential legal files. The activity associated with the breach is classified under business services, and the incident appears to involve external threat actors targeting organizations within that sector.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.