[INCRANSOM] – Ransomware Victim: Сomet-strip-enterprises-ltd
![[INCRANSOM] - Ransomware Victim: Сomet-strip-enterprises-ltd 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: INCRANSOM
VICTIM NAME: Сomet-strip-enterprises-ltd
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the INCRANSOM Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak page pertains to Comet Strip Enterprises Ltd, a Canadian company that specializes in importing seasonal and general merchandise, including products for holidays such as Christmas and Halloween, as well as footwear and summer items. The leak was discovered on July 17, 2025, and the company’s public exposure includes a screenshot of their online presence, which provides visual confirmation of the compromise. The leak suggests that sensitive operational or internal information may be at risk, although specific details of the compromised data are not disclosed in the available content. The incident highlights potential vulnerabilities in the company’s cybersecurity posture.
The leak page contains no specific references to PII or highly sensitive data such as customer or employee information. It emphasizes the company’s extensive product catalog and its focus on customer service but does not detail the nature of the leaked data. Additionally, the publication includes visuals like a screenshot that hints at possible internal documents or interfaces being compromised. While no direct download links or data leaks are explicitly mentioned, the presence of visual evidence and the claim URL suggest that the perpetrators may possess or have leaked internal files or proprietary business information. The geographical context is Canada, and the company’s activity falls within retail importation, posing potential risks to their operational continuity.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.