[INCRANSOM] – Ransomware Victim: iscamen

image

Ransomware Group: INCRANSOM

VICTIM NAME: iscamen

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the INCRANSOM Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page pertains to a victim entity known as ISCamen, an organization based in Argentina (AR) involved in the management of agricultural waste and environmental protection. The attack date is reported as June 5, 2025, although the specific nature of the incident has not been detailed. The page includes a screenshot illustrating the leak, which appears to contain internal data or documentation relevant to the victim’s operations. The leak may contain sensitive information related to their technical activities and management processes, but explicit details are not provided here to protect privacy. Download links or data exfiltrated are not specified explicitly in the available information.

The victim operates within the agricultural sector, focusing on phytosanitary protection and technical exchanges aimed at pest control and regulation of agricultural product entry. The organization serves clients such as agricultural producers and regulatory agencies, particularly in Mendoza. The leak’s publication date is shortly after the attack discovery, on June 5, 2025. An image associated with the leak shows what appears to be internal documents or screenshots, indicating a breach of confidential operational data. No personally identifiable information or sensitive corporate data has been explicitly listed for public dissemination; the report is intended for a high-level overview of the incident and its implications.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.