LockBit 3.0 Ransomware Victim: fujikura[.]co[.]jp

image 11
LockBit 3.0 Ransomware

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the LockBit 3.0 Onion Dark Web Tor Blog page.

Victim Namefujikura[.]co[.]jp
Victim Logo
(if available)
fujikura co jp victim
DescriptionWe gained access to the main office and to all branches of the company around the world! Domains to which access was obtained and from where we pumped the data (the number of PCs is indicated in brackets): FETL(360), FECL(61), DDK1TH(105), pcttfetl(40), WorkGroup(~700), JP(~2500), RID01(300~), SGDCM(~60), SWANZ(~450), and more domains. all pc ~5000-6000 718GB of valuable and sensitive information was stolen from the company’s network, including accounting, reporting, accounts, certificates, letters, many different internal documentation, tables, personal data of employees and much more. we invite you to enter into negotiations About company: Fujikura Ltd. is a global, Tokyo-based electrical equipment manufacturing company, developing and manufacturing power and telecommunication systems products, including devices for optical fibers, such as cutters and splicers. The post will be updated, stay tuned! Contents of the stolen data: 1. Product Reports with Problem Checking 2. HR reports by year and month 3. Sales invoices, objectives, sales results, balance sheets 4. Reports and presentations to reduce costs. Financial statements of subsidiaries. 5. Hazard Identification and Risk Assessment Production or Production 6. Sales accounting 7. NDA_(Non Disclosure Agreement) 8. Environmental Reports on Emissions, Pollution. Financial statements. employee training matrix 9. Audit of export security controls, with signatures 10. Report on commission payments in $ and ¥ 11. Evaluation of suppliers: delivery, efficiency, costs. 12. CAR Control Record(Internal) 13. Acceptance of goods or parts and more…
Uploaded Date30 JAN, 2023 06:42 UTC
Dark Web Post UpdatedUPDATED: 30 JAN, 2023 06:55 UTC
Publish Date of Files if Ransom is not Paid20 Feb, 2023 02:42:20 UTC
WarningALL AVAILABLE DATA WILL BE PUBLISHED !
Cost to Extend Deadline by 24 holursN/A
Cost to Destroy All InformationN/A
Cost to Download the Data at Any momentN/A


Countdown Timer as shown on the LockBit Blog

Until files
published

Onion Site Indicator Of Compromise (IOC):
h XX p://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd[.]onion

 


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon using the button below

Digital Patreon Wordmark FieryCoralv2

To keep up to date follow us on the below channels.

To keep up to date follow us on the below channels.

join
Click Above for Telegram
discord
Click Above for Discord
reddit
Click Above for Reddit
hd linkedin
Click Above For LinkedIn