[RADAR] – Ransomware Victim: OpenEyes Technologies Inc[.]

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the RADAR Onion Dark Web Tor Blog page.

Ransomware group:
RADAR
Victim name:
OPENEYES TECHNOLOGIES INC[.]

AI Generated Summary of the Ransomware Leak Page

OpenEyes Technologies Inc. is identified as the primary victim in a ransomware leak post published on 2025-10-29 18:09:08.000000. The post, attributed to the RADAR group, states that confidential data from OpenEyes Technologies Inc. and OpenEyes Software Solutions Pvt. Ltd. (OPC) has been compromised. The description references both entities under the OpenEyes brand, including a corporate office in India and a U.S. headquarters. Because no explicit compromise date is provided, the post date is treated as the publication date. The page does not disclose a ransom amount or demand. It presents the incident as a data leak involving exfiltrated confidential data rather than an encryption event.

Media and contact information: The leak page lists contact details for the two organizations; however, in this public summary, all personally identifiable information (emails, phone numbers, and physical addresses) has been redacted. The page is reported to contain no screenshots, images, downloads, or external links, indicating there are zero images or downloadable content attached to the leak post. While the victim name is retained to identify the incident, any additional identifying details have been removed to protect privacy.

Context and risk: The victim is a United States–based technology company, with a related Indian entity mentioned in the description. The leak aligns with common ransomware patterns that emphasize data exfiltration and public-facing disclosures, rather than a disclosed encryption event. There is no ransom amount stated on the leak page, and no evidence of a data release schedule or downloadable data accompanying the post. The absence of images and links reduces corroborating material, but the post nonetheless signals a data breach that could carry operational and reputational risk for the victim.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features