[FLOCKER] – Ransomware Victim: Idgcayman[.]com
![[FLOCKER] - Ransomware Victim: Idgcayman[.]com 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: FLOCKER
VICTIM NAME: Idgcayman[.]com
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the FLOCKER Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The affected entity is identified as the interior design company operating under the domain “Idgcayman.com,” located in the Cayman Islands. The breach was discovered on July 7, 2025, approximately a week after the attack, which is believed to have occurred on June 30, 2025. The leak page emphasizes the company’s long-standing presence in the interior design industry within the Cayman Islands. A screenshot of the leak is available, showing internal documents or data, although the specific content is not detailed in the summary. The attackers, linked to the “flocker” group, have potentially leaked information, with a claim URL provided for further details.
The leak indicates the compromise of business-related data, though explicit details about the contents are not visible at this stage. No evidence suggests the exposure of Personally Identifiable Information (PII) or sensitive client data. The message underscores the recent victimization of this longstanding company within the interior design industry, highlighting the risks faced by firms in the region. The attack appears to be part of a broader ransomware campaign, aimed at extracting valuable information, potentially including internal communications or operational documents. Additional technical or specific data about the leak has not been publicly disclosed currently.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.