[IMNCREW] – Ransomware Victim: Apntelecom[.]com

image

Ransomware Group: IMNCREW

VICTIM NAME: Apntelecom[.]com

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the IMNCREW Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware group IMNCrew has claimed responsibility for a data breach involving Apntelecom.com, a telecommunications provider based in Asia Pacific. The attack was confirmed on July 4, 2025, with the compromise date aligning precisely with the discovered timestamp. The breach appears to involve sensitive company data, as the group provides a link to a password-protected archive containing the leaked information. The leak emphasizes the victim’s industry as telecommunications, highlighting their role as a major VoIP service provider with operations in the United States and the Philippines. No explicit mention of the specific data or files leaked is provided publicly, but the leak includes a downloadable archive.

The victim’s description details their infrastructure, including their Texas-based primary setup in the One Wilshire Building in Los Angeles and additional offices in the Philippines. The attack could potentially impact the company’s highly critical voice-over-IP services and client operations worldwide. The webpage does not include explicit images or screenshot previews; however, the presence of a download link indicates that the hackers may have exfiltrated significant data. The leak is publicly accessible through the group’s designated platform, but no further technical specifics about the compromised data are available. Authorities or stakeholders should monitor the situation for potential data misuse or impact on service continuity.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.