[RHYSIDA] – Ransomware Victim: JASCO Applied Sciences
![[RHYSIDA] - Ransomware Victim: JASCO Applied Sciences 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: RHYSIDA
VICTIM NAME: JASCO Applied Sciences
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the RHYSIDA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
JASCO Applied Sciences, a Canadian technology firm, is listed as the victim on a ransomware leak page attributed to the Rhysida group. The page carries a post date of October 7, 2025 (timestamp 2025-10-07 16:40:28.967715). The leak appears to announce a breach in line with data-exfiltration campaigns, but the available data does not specify whether the attackers encrypted systems or only exfiltrated data. A claim URL is indicated on the page, signaling the attackers’ intent to direct readers to ransom communications, though the exact URL is not disclosed in this summary.
According to the metadata, there are no visible images or screenshots associated with the post, and there are no downloadable files or attachments indicated. The victim is listed in the Technology sector and is based in Canada. No ransom amount is provided in the available data. The presence of a claim URL suggests further communications may exist beyond the posted page, but no additional content is shown here.
Given the limited information, the post offers minimal detail about the scope or sensitivity of any compromised data. There is no explicit compromise date beyond the post date, which is treated here as the publication date. The involvement of Rhysida aligns with known ransomware patterns, but the exact nature of impact (encryption, data leakage, or both) remains unspecified in the provided data. The summary centers on the victim identity and location, with the page’s post date serving as the primary temporal marker.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.