Haron Ransomware Victim: GROUP OF COMPANY

Click the icon to Follow me:- twitterTelegramRedditDiscord
Haron Ransomware Logo
Haron Ransomware Blog Logo

NOTE: The information on this page is fully automated and scraped directly from the Haron .onion Dark Web Tor Blog page and reposted here for awareness.

Victim NameGROUP OF COMPANY
Victim URLwww[.]fairlight[.]nl,www[.]focusamsterdam[.]com,www[.]phlippoproductions[.]com
Total Post ViewsViews: 5374
Victim Location1.De Kazematten 19 6681CS Bemmel The Netherlands 2.Rent-All B.V. De Kazematten 21 6681CS Bemmel The Netherlands 3.Focus Amsterdam BV. Maroastraat 80 1060 LG Amsterdam The Netherlands 4.Maroastraat 80 1060 LG Amsterdam The Netherlands 5.Cort van der Lindenstraat 7, 2288 EV Rijswijk
Date post scraped by RedPacket Security11/3/2021
Next Update from Blog Threat ActorsNext update: 1 days from scrape date
Additional InformationWe have gained access to all servers on your network. At this point, all information on your servers has been encrypted. We also received all the information that you stored on servers and NAS storages. We have over 1TB of your documentation at our disposal. Personnel documents, ID passports, accounting documents, contracts, etc. If you do not contact us, all information will be publicly available.
Screenshots posted true
Onion Site Victim Post URL
hXXp://midasbkic5eyfox4dhnijkzc7v7e4hpmsb2qgux7diqbpna4up4rtdad[.]onion/blog.php/blogs.php?id=20

To get additional information, please download the Tor Browser and then visit the onion site located here:
(to defang, remove the [.] and replace with. Also, change hXXp to HTTP)

You can then copy and paste it into the Tor browser to get updates regarding this victim of Haron Ransomware

Available for Amazon Prime