[INCRANSOM] – Ransomware Victim: tiergesundheitszentrum-koenigslutter[.]de
![[INCRANSOM] - Ransomware Victim: tiergesundheitszentrum-koenigslutter[.]de 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: INCRANSOM
VICTIM NAME: tiergesundheitszentrum-koenigslutter[.]de
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the INCRANSOM Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The leak pertains to a healthcare provider operating in Germany, specifically the Königslutter Animal Health Center. This veterinary practice offers services for small animals across the region and employs around 24 staff members, generating approximately 5 million US dollars in revenue. The compromised data leak was discovered on July 10, 2025, after the attack occurred earlier the same day. The incident involved significant data exfiltration, with approximately 12GB of information downloaded. The leak page includes a screenshot of internal documents and details about the scope of data accessed, emphasizing the disruption inflicted on the veterinary clinic.
The ransomware attack appears to have exploited vulnerabilities within the clinic’s digital infrastructure, leading to the theft of sensitive operational information. Public-facing details indicate that the attackers claim to have exfiltrated data related to employee records, business communications, and client data, although specific PII has been sanitized in the dissemination. The leak page provides a link to further disclosures, and the presence of downloadable data suggests that the threat actors may release or have already released parts of the stolen information. The incident underscores the cybersecurity challenges faced by healthcare entities, especially regional veterinary services, in securing their data against evolving threats.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.