[INCRANSOM] – Ransomware Victim: Töller

image

Ransomware Group: INCRANSOM

VICTIM NAME: Töller

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the INCRANSOM Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

On August 15, 2025, a leak post published by the threat actor group incransom claimed responsibility for a data-exfiltration incident against a Belgium-based organization. The victim’s name is redacted in this summary, and the industry is not disclosed. The post frames the incident as a data leak rather than encryption and lists several categories of data it says were stolen: personal data of customers and interested parties; violations of data storage terms including personal data; accounting and other financial data; supplier and partnership agreements; marketing and analytical data; and internal processes and HR information. The post includes a claimed revenue figure of approximately $5 million and provides a claim URL; it also shows a gallery of seven image attachments that are presented as screenshots of internal documents to corroborate the exfiltration.

Defanged references indicate the image attachments are hosted on onion services; the exact content of the screenshots is not detailed in this summary. The leak page emphasizes data leakage and potential public release, aligning with double-extortion ransomware patterns. A short page excerpt references the victim’s domain, but this domain is redacted in this summary to protect privacy. Overall, the leak depicts a broad exfiltration of sensitive data across multiple categories, including personal data, financial data, supplier and partnership records, marketing analytics, and internal HR information, underscoring privacy, regulatory, and business risks for the organization and its customers.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.