[FLOCKER] – Ransomware Victim: Ajmanre[.]gov[.]ae

image

Ransomware Group: FLOCKER

VICTIM NAME: Ajmanre[.]gov[.]ae

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the FLOCKER Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak involves the Ajman Department of Land & Real Estate in the United Arab Emirates. The attack was publicly disclosed on June 12, 2025, and is attributed to a group known as “flocker.” The compromised domain is ajmanre.gov.ae, which indicates it is linked to governmental land management and real estate regulation activities. The leak presents a screenshot of the affected system or data, suggesting the potential exposure of sensitive internal information related to land and real estate in the region. The leak’s publication aims to raise awareness of a cybersecurity breach impacting a key public sector entity.

Although specific data details are not provided, the presence of a claim URL on a dark web platform indicates that the group claims responsibility for the breach and might be demanding a ransom or public acknowledgment. The attack date is noted as June 5, 2025, with the violation discovered shortly after on June 12, 2025. The incident may impact administrative operations and public trust concerning land and property management in Ajman. Visual evidence, in the form of a screenshot, indicates that the attackers possibly accessed or leaked internal documents or system interfaces. No personally identifiable information or individual PII has been disclosed publicly in this leak summary, focusing purely on the technical and contextual overview of the incident.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.