[INTERLOCK] – Ransomware Victim: Kearney Public Schools

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the INTERLOCK Onion Dark Web Tor Blog page.

Ransomware group:
INTERLOCK
Victim name:
KEARNEY PUBLIC SCHOOLS

AI Generated Summary of the Ransomware Leak Page

On October 15, 2025, the leak page publicly attributed to the Interlock ransomware group lists Kearney Public Schools as a victim in the Education sector. The post does not specify whether the attack encrypted systems or simply exfiltrated data, but the format is consistent with a data-leak disclosure. The page describes a web-based file manager in PHP, marketed as Tiny File Manager, which the attackers use as the interface to access and present the exfiltrated material. The body excerpt resembles a directory-style listing with fields such as Item Type and Item Name and includes a search function across folders and subfolders, indicating the attackers have cataloged stolen files in a navigable structure. A claim URL is indicated on the page, implying a channel for ransom discussions; however, the dataset provides no ransom amount. The post date of the leak page is October 15, 2025 at 13:22:28.576359.

Notably, the leak page shows no images or screenshots; the dataset records zero images and no media assets. There are no visible downloads, emails, phone numbers, or addresses, and the victim’s name remains exactly “Kearney Public Schools.” The page’s description emphasizes the use of Tiny File Manager as the delivery interface for the stolen data, and while a claim URL is present, the data does not include any specified ransom figure. In summary, the post presents a data-leak style disclosure rather than an encryption notice, focusing on listing and exposing exfiltrated material tied to the education sector entity.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features