[LYNX] – Ransomware Victim: ozsoft[.]com[.]au
![[LYNX] - Ransomware Victim: ozsoft[.]com[.]au 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the LYNX Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On October 22, 2025, a ransomware leak post attributed to the lynx group publicly identifies ozsoft.com.au as a victim. The page places ozsoft.com.au in the Technology sector, noting that it provides Custom Software and IT Services. The company is described as employing between 20 and 49 people and generating revenue in the AUD range of 1–5 million. The organization is said to be headquartered in Australia, but the precise location details are redacted to protect sensitive information. The leak post includes a claim URL, indicating the attackers are presenting a public claim as part of the breach notification. Because the data does not specify a compromise date, the provided timestamp is treated as the post date for the leak: 2025-10-22 08:48:16.755000.
There are no visible screenshots, internal documents, or downloadable items on the leak page—the data indicates zero images and no downloads. The metadata does not specify whether encryption or data exfiltration occurred, and there is no ransom amount described in the available information. The presence of a claim URL suggests the attackers intend to publish further details or demands, but the page currently offers limited substantive content beyond identifying ozsoft.com.au as a victim. The entry remains focused on the victim’s identity, with other company names and precise headquarter details redacted as appropriate.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.