[INCRANSOM] – Ransomware Victim: DILOSA FOOD COMPANIES

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the INCRANSOM Onion Dark Web Tor Blog page.

Ransomware group:
INCRANSOM
Victim name:
DILOSA FOOD COMPANIES

AI Generated Summary of the Ransomware Leak Page

On October 29, 2025, a ransomware leak post associated with the group incransom was published for DILOSA FOOD COMPANIES. The victim operates in the Agriculture and Food Production sector. The post date (2025-10-29 14:55:00.000000) is used here as the published date since no separate compromise date is provided. The leak page is described in the data as a data-breach post, but the entry does not explicitly state whether files were encrypted or data exfiltrated—the impact field is not populated. A claim URL is indicated as present on the page, though the actual URL is not included in this summary, and no ransom amount or terms are shown. The entry does not list an official website for the victim, and the description includes several contact channels that are redacted in this report to protect privacy.

The leak page contains no screenshots or images and lists no downloads or media attachments. The record preserves DILOSA FOOD COMPANIES as the sole victim name in this summary, with no other company names highlighted in the supplied snippet. The content is presented in English, and there is no explicit mention of encryption or a data-leak motive beyond the generic breach label. Personal contact information such as emails and phone numbers is present on the page but has been redacted for privacy in this report. A claim URL is indicated as present, but the URL itself is not disclosed here, and no ransom figure is provided in the available data regarding this entry.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features