[SINOBI] – Ransomware Victim: glawitsch-sutter
![[SINOBI] - Ransomware Victim: glawitsch-sutter 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the SINOBI Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On October 27, 2025, a leak post attributed to the Sinobi group concerns the victim glawitsch-sutter. The visible content on the leak page centers on a historical profile of the victim’s legal services firm, outlining a founding in the early 20th century and leadership spanning multiple generations, culminating in a 2015 restructuring to a GmbH while emphasizing continuity of high-quality standards. The page indicates a claim URL is present, which is typical for ransomware leak notes, but there is no explicit evidence in the accessible text of data samples, encryption status, or a ransom figure. There are no images or downloadable files shown on the page, so the post appears to be text-forward rather than a media-heavy data dump. Overall, the content reads as a high-level victim notice rather than a detailed data exfiltration package.
Post date: October 27, 2025 (17:17:29.262000). Because no separate compromise date is provided in the dataset, this is treated as the post date. The victim name is kept as glawitsch-sutter; the metadata lists the industry as not found, but the descriptive text on the page implies the entity operates as a law practice in the legal services sector. The post includes a claim URL, but there are no explicit ransom demands, data volumes, or media attachments shown in the available excerpt. In sum, the leak page presents a minimal, text-forward victim notice with no screenshots or other media and no breaching metrics disclosed in the provided data.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
