[WORLDLEAKS] – Ransomware Victim: Informatika A[.]D[.]

image

Ransomware Group: WORLDLEAKS

VICTIM NAME: Informatika A[.]D[.]

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the WORLDLEAKS Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak pertains to Informatika A.D., an information technology and services company located in Belgrade, Serbia. The breach was publicly disclosed on June 25, 2025, highlighting a security incident that compromised some of the company’s data. Informatika A.D. specializes in providing comprehensive IT solutions, including system integration, IT consulting, application development, and infrastructure services. Their clientele spans several sectors such as public administration, finance, healthcare, telecommunications, energy, and utilities, both within Serbia and internationally. The leak page indicates that the affected organization offers cloud services, digital transformation, and outsourcing, emphasizing its role as a significant player in the regional IT industry.

The leak date is set for June 25, 2025, with additional details revealing that the incident was discovered shortly afterward, on June 25, 2025, at approximately 12:45 PM. The page mentions the presence of data leaks and the potential for available download links to stolen or compromised information. Visual content details are not provided, but the page includes screenshots that likely showcase internal documents or data snippets. No specific personally identifiable information (PII) or sensitive company data is exposed directly in the summary, maintaining the focus on the incident as a security event rather than a data breach publication.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.