[RHYSIDA] – Ransomware Victim: Automated Logistics Systems
![[RHYSIDA] - Ransomware Victim: Automated Logistics Systems 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the RHYSIDA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On November 4, 2025, Automated Logistics Systems, a transportation and logistics provider, was publicly identified as a victim in a ransomware leak post attributed to the Rhysida group. The leak page places the victim within the Transportation/Logistics sector and presents the incident as a breach disclosed through a ransomware leak. The post date is 2025-11-04 14:51:53.944133; there is no explicit compromise date provided on the page, so the post date is used as the reference point. The available metadata does not specify whether the impact was encryption or a data leak, nor does it include a stated ransom amount or data volumes; the page does not provide detailed technical indicators or evidence beyond identifying the victim and the threat actor.
Regarding visual or downloadable content, the leak page shows no images or screenshots and reports no downloads, samples, or linked files. The supplied data indicates zero images and no attachments or data exports. There is no non-English content or PII present in this summary, and no other company names are highlighted beyond the victim name and the Rhysida attribution. Taken together, the page identifies Automated Logistics Systems as a victim in a Rhysida leak post but offers limited detail on data types, scope, encryption status, or ransom demands.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
