LockBit 3.0 Ransomware Victim: aten[.]com

image 11
LockBit 3.0 Ransomware

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the LockBit 3.0 Onion Dark Web Tor Blog page.

Victim Nameaten[.]com
Victim Logo
(if available)
DescriptionOffice in the USA ATEN International Co.(Ltd) (Chinese: 宏正自動科技; pinyin: Hóngzhèng Zìdòng Kējì) is a multinational manufacturer of connectivity and access management hardware headquartered in Xizhi District, New Taipei, Taiwan. Its products include KVM switches, audiovisual switches and matrices, intelligent power distribution units, information technology management systems, and interface adapters.[2] ATEN has subsidiaries in several countries and is the parent company of IOGEAR.
Uploaded Date11 NOV, 2023 17:07 UTC
Dark Web Post UpdatedUPDATED: 12 NOV, 2023 12:07 UTC
Publish Date of Files if Ransom is not Paid28 Nov, 2023 09:06:30 UTC
Cost to Extend Deadline by 24 holursN/A
Cost to Destroy All InformationN/A
Cost to Download the Data at Any momentN/A

Countdown Timer as shown on the LockBit Blog

Until files


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on "Patreon" or "Buy Me A Coffee" using the buttons below

 To keep up to date follow us on the below channels.