[INCRANSOM] – Ransomware Victim: summitgolfbrands[.]com

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the INCRANSOM Onion Dark Web Tor Blog page.

Ransomware group:
INCRANSOM
Victim name:
SUMMITGOLFBRANDS[.]COM

AI Generated Summary of the Ransomware Leak Page

On October 18, 2025 at 23:59:00, a ransomware leak post attributed to the INCRansom group targets summitgolfbrands.com. The page describes the victim as a US‑based consumer services company that designs and sells premium golf apparel and sportswear, with online sales and distribution through leading country clubs and resorts worldwide. The leak notes the company operates at scale—approximately 125 employees with annual revenue around $27.9 million, spanning more than 25 countries and over 3,000 accounts. The post follows the typical ransomware‑leak format by naming the victim and signaling a data breach, and it indicates the presence of a claim URL on the page; however, the provided data does not include explicit statements about encryption or the specific data stolen, nor any ransom amount. Given the data available, the post date is treated as the publication date for this leak entry.

The leak page provides minimal evidence: there are no screenshots or images (images_count is 0) and no downloadable files (downloads_present is false). A claim URL is indicated as present, though the actual link is not shown here. The source text lists contact information, but personal data such as emails and phone numbers have been redacted in this summary to protect privacy, while the victim name summitgolfbrands.com is preserved. Any URLs from the original page would be defanged in this summary, and no direct media content is reproduced. Overall, the post aligns with a standard ransomware‑leak format, offering basic company context but not providing explicit details about data types, encryption status, or ransom figures within the supplied data.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features