[STORMOUS] – Ransomware Victim: usbmemorydirect[.]com

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the STORMOUS Onion Dark Web Tor Blog page.

Ransomware group:
STORMOUS
Victim name:
USBMEMORYDIRECT[.]COM

AI Generated Summary of the Ransomware Leak Page

usbmemorydirect.com, a United States‑based technology company, is listed as a victim on a ransomware leak page attributed to the Stormous group. The post is dated 2025-10-27 20:47:57.779795, and in the absence of a separate compromise date this timestamp is treated as the post date. The leak page claims that the attackers exfiltrated a broad set of data from usbmemorydirect.com, including personal data (individual names, photos, and related identifiers), company or business data (names, services, tools, equipment), backup copies, system archives compressed files, internal documents, and project files, among other data types. There is no stated ransom amount or explicit ransom note on the page, and there is no linked claim URL or downloadable data indicated in the provided data. The post is attributed to the Stormous group and identifies usbmemorydirect.com as the victim within the Technology sector in the United States.

The page contains no visual content such as screenshots or images: the dataset shows zero images and there are no downloads, links, or attachments associated with the leak post. Because the only date provided is the post date and no ransom figure is disclosed, the available metadata suggests a data-exfiltration narrative rather than an encryption-based incident with a public ransom demand. For defenders, continued monitoring of usbmemorydirect.com’s status and cross-checking with reliable CTI sources is advisable to confirm any subsequent disclosures, data samples, or ransom terms if they emerge.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features