[INCRANSOM] – Ransomware Victim: auge[.]com

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the INCRANSOM Onion Dark Web Tor Blog page.

Ransomware group:
INCRANSOM
Victim name:
AUGE[.]COM

AI Generated Summary of the Ransomware Leak Page

auge.com is listed as a ransomware victim in a leak post attributed to the group Incransom. The page identifies the victim as a United States–based manufacturer and distributor of commercial and specialty alloy fasteners, including machined components, with operations described as based in Houston, Texas and tracing back to 1965. The attackers claim to have access to contracts, data for all employees, internal emails, drawings, and more, and they state they will share all this material. The post date on the leak is October 25, 2025; since no separate compromise date is provided, this is treated as the post date. No explicit ransom amount or demand is listed in the available text. Attribution to Incransom is noted, and the page presents a data-leak narrative consistent with extortion-style ransomware activity.

The leak page shows no screenshots or images (the metadata indicates zero images). There are no visible downloads or attached files in the excerpt. The page emphasizes that sensitive data—contracts, employee records, internal correspondence, and technical drawings—are in the attackers’ possession and will be shared, aligning with a data-exfiltration approach. While the post date remains October 25, 2025, the excerpt does not reveal a ransom figure or timeline for data release. The victim name auge.com is preserved in this report, while other company names mentioned in the source text are not echoed here. No explicit compromise date is provided beyond the post date.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features