[PLAY] – Ransomware Victim: Encore Repair Services

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the PLAY Onion Dark Web Tor Blog page.

Ransomware group:
PLAY
Victim name:
ENCORE REPAIR SERVICES

AI Generated Summary of the Ransomware Leak Page

On November 1, 2025, Encore Repair Services, a United States–based business services provider, appears as a ransomware victim in a leak post associated with the actor group identified as “play.” The leak entry names Encore Repair Services and references the company website encorerepair[.]com. The post date in the metadata is 2025-11-01, and since no explicit compromise date is provided, this date is treated as the post date. The page follows a standard extortion post pattern, including a defanged onion-based contact/negotiation link, but the available data do not specify whether devices were encrypted or whether data were exfiltrated, leaving the exact impact label unspecified in the record.

The leak page contains minimal publicly visible content beyond the victim identity and website. There are no screenshots or internal documents displayed (images_count is 0), and there are no downloadable files or external links listed (downloads_present false; link_count 0). A claim URL is indicated as present, and a defanged onion address is provided as a means to negotiate or access the attackers’ offer, though the exact address is not shown in this summary. The entry was added to the listing on 2025-10-28 and published on 2025-11-01, with the page recording 901 views to date. No other company names appear in the data, and the available information does not reveal the specific data type involved, whether encryption occurred, or any ransom figures.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features