Haron Ransomware Victim: Westrup Company

Click the icon to Follow me:- twitterTelegramRedditDiscord
Haron Ransomware Logo
Haron Ransomware Blog Logo

NOTE: The information on this page is fully automated and scraped directly from the Haron .onion Dark Web Tor Blog page and reposted here for awareness.

Victim NameWestrup Company
Victim URLwww[.]westrup[.]com
Total Post ViewsViews: 5349
Victim LocationSorøvej 21, 4200 Slagelse, Denmark
Date post scraped by RedPacket Security11/3/2021
Next Update from Blog Threat ActorsNext update: 1 days from scrape date
Additional InformationWe have gained access to all servers on your network. At this point, all information on your servers has been encrypted. We also received all the information that you stored on servers and NAS storages. We have over 700GB of your documentation at our disposal. Personnel documents, ID passports, accounting documents, contracts, etc. If you do not contact us, all information will be publicly available. img-imgs/West2.png img-imgs/West1.png
Screenshots posted true
Onion Site Victim Post URL
hXXp://midasbkic5eyfox4dhnijkzc7v7e4hpmsb2qgux7diqbpna4up4rtdad[.]onion/blog.php/blogs.php?id=19

To get additional information, please download the Tor Browser and then visit the onion site located here:
(to defang, remove the [.] and replace with. Also, change hXXp to HTTP)

You can then copy and paste it into the Tor browser to get updates regarding this victim of Haron Ransomware

Available for Amazon Prime