[NOVA] – Ransomware Victim: bassetti-group[.]com
![[NOVA] - Ransomware Victim: bassetti-group[.]com 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the NOVA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On the leak page for bassetti-group.com, a Germany-based technology company, the available description portrays the BASSETTI Group as a pioneer in industrial digitalization. It notes that the group has supported its customers for more than 30 years in transferring and enhancing the value of their technical heritage to ensure sustainable industrial excellence. The post date associated with this entry is 2025-10-29 16:51:24.167430, and no compromise date is provided in the data; thus, this should be treated as the post date. The dataset does not specify whether the attack involved encryption or a data leak, as the impact field is not populated. The record indicates that a claim URL is present on the leak page, but no ransom figure is disclosed in the available data.
Regarding media and attachments, the data shows no screenshots or images on the page (images_count is 0) and no downloadable content (downloads_present is false). The body excerpt field is empty, so there is no additional narrative text beyond the short corporate description. There is no explicit information in the dataset about the nature of any compromised data or a ransom demand; the entry appears to function more as a corporate-profile style page than a detailed breach narrative, with only the existence of a claim URL indicated.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
