[INCRANSOM] – Ransomware Victim: iblinfo[.]de

image

Ransomware Group: INCRANSOM

VICTIM NAME: iblinfo[.]de

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the INCRANSOM Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page pertains to a technology-focused engineering firm based in Halle (Saale), Germany. The victim, operating under the domain iblinfo.de, specializes in land development planning and geodata services, primarily serving rural areas. The breach was discovered on April 16, 2025, with the data leak occurring shortly after, on the same day. The compromised data includes approximately 56 GB of internal information, potentially exposing operational details and internal documents. The page features a screenshot depicting internal content, which hints at the extent of the breach. No personally identifiable information or sensitive client data is explicitly disclosed, but the leak suggests a significant violation of internal data security.

The incident involves an unknown hacker group that publicly announced the breach, which includes the theft of confidential business data and a significant volume of internal records. The victim’s industry is engineering with a revenue of around 5 million USD and 25 employees. The breach’s timing indicates a deliberate attack aiming at disrupting business operations or gaining leverage. The published data may include internal communications, project details, and other proprietary information, though explicit content is not detailed. The leak page emphasizes the presence of download links, hinting that the stolen data may be available for public access, potentially causing reputational and operational damage to the company.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.

[INCRANSOM] – Ransomware Victim: iblinfo[.]de

image

Ransomware Group: INCRANSOM

VICTIM NAME: iblinfo[.]de

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the INCRANSOM Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page reports a cyberattack targeting the engineering firm operating under the domain iblinfo.de, based in Halle (Saale), Germany. The identified compromise date is April 16, 2025. The incident involved the exfiltration of a substantial amount of data, approximately 56 gigabytes, including sensitive business information related to land development consulting services. The company specializes in geodata-based planning and land ownership organization, serving regional clients with a workforce of around 25 employees and an annual revenue of about $5 million. The leak likely contains internal documents and operational data, which could impact the company’s reputation and client confidentiality.

The leak page features a screenshot of internal data, emphasizing the severity of the breach. It also mentions that the attackers are part of a group identified as incransom, and that the data has been publicly disclosed on a dark web platform. No specific threat to individual employees or clients is indicated, and the information provided appears to be focused on exposing the breach and demonstrating the severity of the attack. The incident underscores the importance of robust cybersecurity measures, especially for firms handling sensitive land and geospatial data. No direct download links are provided, but the published data may include internal documents relevant to the company’s operations.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.