[WORLDLEAKS] – Ransomware Victim: Landscape Hawaii

image

Ransomware Group: WORLDLEAKS

VICTIM NAME: Landscape Hawaii

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the WORLDLEAKS Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The leaked data concerns a professional landscaping company based in Hawaii, operating within the consumer services industry in the United States. The attack was discovered on June 29, 2025, with the attack date recorded as June 28, 2025. The breach involved the exposure of the company’s internal information, which may include business details and operational data. While specific sensitive information was not detailed, the leak suggests potential vulnerabilities in the company’s data security posture. The page contains no explicit mention of personally identifiable information (PII) or employee details, indicating that the breach primarily involves corporate data.

The leak includes a claim URL hosted on the dark web, providing access to a purported data dump associated with this incident. The leak page shows no evidence of graphic or harmful content beyond the disclosure of potentially sensitive business information. The company’s website domain is listed as landscapehi.com, and the description emphasizes their expertise in landscape design, installation, and maintenance tailored to Hawai’i’s unique environment. The incident highlights the importance of cybersecurity measures for organizations handling client data and operational details. No evidence of additional compromised systems or data such as employee records or financial information was explicitly indicated. The leak underscores the need for vigilance in protecting digital assets against ransomware threats.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.