[RADAR] – Ransomware Victim: Fouad Alghanim & Sons Group of Companies Holding W[.]L[.]L[.]
![[RADAR] - Ransomware Victim: Fouad Alghanim & Sons Group of Companies Holding W[.]L[.]L[.] 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the RADAR Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On October 31, 2025, a ransomware leak post purports to involve Fouad Alghanim & Sons Group of Companies Holding W.L.L. in a security incident. The post presents the event as a data-leak scenario rather than a classic encryption strike, and it labels certain materials as “Files Marked Confidential.” It references a confidential file linked via a dark-web onion address, though the exact URL is not included in this summary. No ransom amount or payment instructions are stated on the page, and there is no evidence of an active public download or image gallery in the provided data. The post date is explicit, but a separate compromise date is not provided in the data.
The leak entry identifies the victim as Fouad Alghanim & Sons Group of Companies Holding W.L.L., with the country indicated as Kuwait. The industry is not disclosed in the dataset. The page contains no visible screenshots or downloadable content (the data shows zero images and zero downloads), and there is no URL-based claim or remediation link presented in this summary. A line on the page suggests contacting the operators to remove the files from their servers, but no direct contact details are provided here. Taken together, the metadata and text point to a data-exfiltration narrative rather than a documented encryption event, anchored to the post date of October 31, 2025.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
