[INCRANSOM] – Ransomware Victim: whiteconlee[.]com

image

Ransomware Group: INCRANSOM

VICTIM NAME: whiteconlee[.]com

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the INCRANSOM Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware threat actor has publicly disclosed a data breach involving a privately held real estate development company based in Texas. The attack was confirmed on July 31, 2025, and the incident is believed to have compromised several aspects of the company’s internal information systems. The leak includes screenshots of internal documents, which may contain sensitive operational details. Although the attackers have not publicly released specific stolen data, evidence suggests that confidential business information, potentially including project plans and personnel details, may have been accessed or exfiltrated. The breach appears targeted, aiming to pressure the company into paying a ransom to prevent further disclosures.

The victim company specializes in commercial and residential construction, focusing on high-end multifamily communities in major Texas markets. The leaked information could impact their competitive position and internal operations. The threat actors posted the leak on a dark web platform, accompanied by a screenshot of the compromised website, which emphasizes their ability to access and leak sensitive data. No specific evidence of financial information or employee PII has been confirmed publicly. The attack underscores the risks faced by organizations operating in the construction sector, especially those managing sensitive project and client data. The company’s online presence and contact details suggest it maintains active communication channels, but details about the breach’s scope remain limited at this stage.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.