[PAYOUTSKING] – Ransomware Victim: G*****

image

Ransomware Group: PAYOUTSKING

VICTIM NAME: G*****

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the PAYOUTSKING Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The leak page pertains to a ransomware incident involving a victim identified as G***** in the United States. The attack was discovered on July 14, 2025, and reportedly occurred on July 9, 2025. The compromised data includes approximately 150GB of information, which has been leaked on the dark web. The leak is associated with the group known as “payoutsking,” indicating a possible affiliation with known threat actor clusters. The leak page does not specify the exact nature of the data compromised, nor does it provide detailed information about the victim’s activity or industry. It primarily serves as a公開 confirmation of the breach and data exfiltration.

The page contains references to data size and includes general information about the attack date and discovery timestamp. There are no publicly available press releases or explicit mentions of further harm or ransom demands. The associated screenshot content is not provided, and no specific sensitive information such as PII or corporate details is revealed. The leak appears to be part of a broader campaign by the group “payoutsking,” which is known for data theft and extortion activities. Overall, the leak page publicly displays evidence of a significant data breach involving a US-based entity, emphasizing the ongoing risks posed by cybercriminal groups targeting corporate and individual data.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.