LockBit 2.0 Ransomware Victim: komeg[.]de
![LockBit 2.0 Ransomware Victim: komeg[.]de 1 lockbit logo](https://www.redpacketsecurity.com/wp-content/uploads/2021/08/lockbit_logo.png)
NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark Web Tor Blog page and reposted here for awareness.
| Victim Name | komeg[.]de | 
| Victim Logo (if available) | ![LockBit 2.0 Ransomware Victim: komeg[.]de 2 komeg de victim](https://www.redpacketsecurity.com/wp-content/uploads/2022/02/komeg_de_victim.png) | 
| Description | For over four decades now, KOMEG Industrielle Messtechnik GmbH has been all about innovative product development and advanced applications in production measurement technology. As a full-range provider,KOMEG combines special-purpose measurement technology, quality data technology and workpiece infeed with personalised system solutions with perfect compatibility. | 
| Number of Leaked Files (at time of posting) | 0/16472 | 
| Publish Date of Files if Ransom is not Paid | 03 Mar, 2022 00:00:00 | 
| Warning | All available data will be published ! | 
Countdown Timer as shown on the LockBit Blog
To get additional information, please download the Tor Browser and then visit the onion site located here: 
(to defang, remove the [.] and replace with . Also change hXXp to http)
You can then copy and paste it into the Tor browser to get updates regarding this victim of Lockbit Ransomware
Onion Site URL:
hXXp://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd[.]onion'

 
                      ![[QILIN] - Ransomware Victim: Doha British School 5 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image-300x300.png) 
                       
                       
