[STORMOUS] – Ransomware Victim: www[.]americanadecolchones[.]com
![[STORMOUS] - Ransomware Victim: www[.]americanadecolchones[.]com 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the STORMOUS Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On 2025-10-27 20:46:42.405369, a leak post attributed to the Stormous group identifies www[.]americanadecolchones[.]com, a Colombia-based company in the Consumer Services sector, as a ransomware victim. The post uses the victim’s domain as the identifier and, since no explicit compromise date is provided, treats the published date as the post date. The description field states that VPN access to the company’s internal network is provided, suggesting remote access may have been involved in the intrusion. The record does not specify whether the attackers encrypted systems, exfiltrated data, or demanded a ransom.
The leak page contains no images or downloadable content; there are zero screenshots recorded in the provided data. There is no reported data volume, no ransom figure, and no link to a release or ransom note (claim_url_present is false). As a result, the available information does not confirm the attack’s impact beyond the VPN-access claim.
Because the data do not include a compromise date or explicit impact indicators, this entry should be treated as an initial notification rather than a full incident assessment. The victim’s domain is presented in a defanged form (www[.]americanadecolchones[.]com) to reduce exposure, while the Stormous attribution and sector context are retained for awareness. Analysts should monitor for future disclosures from the threat actors or the victim organization to determine the true scope of the incident and any potential ransom demands.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
