[NOVA] – Ransomware Victim: ShareP

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the NOVA Onion Dark Web Tor Blog page.

Ransomware group:
NOVA
Victim name:
SHAREP

AI Generated Summary of the Ransomware Leak Page

On October 16, 2025, a ransomware leak post attributed to the Nova group identifies ShareP as a victim. The page describes ShareP as a Switzerland-based startup that provides a plug-and-play solution to digitize and optimize urban parking and electric vehicle (EV) charging infrastructure. The leak listing states that ShareP reports about 31 million USD in revenue and around 29 employees. This entry is part of a broader leak page that catalogs multiple victims, but this report concentrates on ShareP. The post date is the published date shown on the page (October 16, 2025), and no explicit compromise date is provided within the excerpt. A claim URL is included for negotiations, consistent with ransomware-extortion patterns; however, no ransom amount specific to ShareP is disclosed in the excerpt. The page also includes a gallery of 32 image attachments, described in the metadata as screenshots or internal documents related to the victim, though the exact contents of the images are not detailed here. URLs to the images and links are defanged in this report.

The leak page appears to incorporate a blog-style section associated with the threat operator, including references to ransomware-as-a-service and negotiation guidance. In total, 32 image attachments accompany the ShareP entry, and the image captions or alt text in the metadata reference various entities outside of ShareP; the content here focuses on ShareP. Redaction has been applied to personal data where present, while the victim name ShareP is preserved. The overall presentation—public exposure of the victim’s data with an explicit negotiation channel and a sizable image gallery of internal materials—illustrates a data-exfiltration/extortion posture rather than a straightforward encryption-only incident within this excerpt. This case highlights ongoing risk to mobility and urban-infrastructure tech firms and the potential for attackers to leverage public exposure to pressure negotiations.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features