[LYNX] – Ransomware Victim: iBUYPOWER
![[LYNX] - Ransomware Victim: iBUYPOWER 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: LYNX
VICTIM NAME: iBUYPOWER
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the LYNX Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak page pertains to iBUYPOWER, a prominent company in the technology sector known for manufacturing custom gaming computers. The leak was discovered on July 22, 2025, and the attack was reportedly carried out on July 21, 2025. The company’s detailed profile highlights its longstanding commitment to quality and innovation within the gaming industry, with a history dating back to 1999. The company has collaborated with major industry brands such as Intel, NVIDIA, and AMD, emphasizing its position in delivering high-performance gaming hardware. The leak includes a screenshot image showcasing some internal visuals related to the breach.
The leak indicates that sensitive information or data related to iBUYPOWER was compromised by the attackers. While specific files or data links are not detailed in this summary, the public claim suggests potential exposure of internal documents or proprietary information. The incident appears to be linked to the group “lynx,” and the leak may have implications for the company’s reputation and customer trust. The leak page provides a URL for further investigation, but no specific PII or sensitive customer data are disclosed in the publicly available content. The company’s activity remains within the technology and gaming hardware manufacturing sector, and the incident is geographically associated with the United States.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.