<?xml version='1.0' encoding='UTF-8' ?>
<rss version='2.0'>
<channel>
<title>Ransom Feed | RSS</title>
<link>https://ransomfeed.it/</link>
<description>Ransomware victims RSS <img referrerpolicy="no-referrer-when-downgrade" src="https://matomo.ransomfeed.it/matomo.php?idsite=1&amp;rec=1" style="border:0" alt="" /></description>
<language>en-us</language>
<item xmlns:dc='ns:1'>
<title>Emek-Elektrik</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32458</link>
<guid>eebbd2ae6d87afe662cc8c922cc35ecf</guid>
<pubDate>Sat, 23 May 2026 22:51:01 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>bravox</b> claims attack for <b>Emek-Elektrik</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3f6f1260be840a2fe6f2a4dff00c03b9722cbd73ea55fc98b9edb9c44e0abd5f</i><br /><br />Target victim <b>website</b>: <i>emek.com.tr</i>]]></description>
<category>bravox</category>
</item>
<item xmlns:dc='ns:1'>
<title>vspsolutions.com.au-FULL-DATA-DUMP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32457</link>
<guid>288da4070b563521170fcaa92e24bbfb</guid>
<pubDate>Sat, 23 May 2026 21:54:42 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>vspsolutions.com.au-FULL-DATA-DUMP</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7b8073224e497775df3fd8c80adfcf4e99a95618f04978e6fc30f63b6e26f01a</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>Salvation-Army</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32456</link>
<guid>df461bdc860cb693713eb0de173f6937</guid>
<pubDate>Sat, 23 May 2026 21:21:03 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>bravox</b> claims attack for <b>Salvation-Army</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d699958b777a6fc53f1958d88228c0167ca0dbbcb4d529783da23593c515aed</i><br /><br />Target victim <b>website</b>: <i>salvationarmy.ca</i>]]></description>
<category>bravox</category>
</item>
<item xmlns:dc='ns:1'>
<title>bangkok.go.th</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32455</link>
<guid>5e13d1e382d895a5a58b40173eb7abfd</guid>
<pubDate>Sat, 23 May 2026 15:22:25 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>krybit</b> claims attack for <b>bangkok.go.th</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4d719db9e47199909f5cb7ce2a1c78f77ee11d1c625efcad8e7b7442e4dd8d99</i><br /><br />Target victim <b>website</b>: <i>bangkok.go.th</i>]]></description>
<category>krybit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mecanizados-y-Montajes-Aeronuticos-mymgroup.es</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32454</link>
<guid>2367a2216a3ec74c8c6dd02123836612</guid>
<pubDate>Sat, 23 May 2026 13:22:39 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Mecanizados-y-Montajes-Aeronuticos-mymgroup.es</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>098358017d6c7f7224c457a72a9a0503bcd7eb755c85e33df54776f32a74a031</i><br /><br />Target victim <b>website</b>: <i>mymgroup.es</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>University-of-Valencia</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32453</link>
<guid>594111d37c181b0b4751bce524a94c4b</guid>
<pubDate>Sat, 23 May 2026 12:54:23 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>University-of-Valencia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e451f09ff82ca9ee31eb0f959a7b9ab3353578bff3aac3ec14bcf7cfe525d17a</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mopas-Online-Supermarket</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32452</link>
<guid>0486089d84114ddf543e7a76356de13c</guid>
<pubDate>Sat, 23 May 2026 09:20:19 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>AuditTeam</b> claims attack for <b>Mopas-Online-Supermarket</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06b7cb0f91a0f34adb13d2d26447db341157e253343bad2ba9e578f345d5b85b</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>AuditTeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>Baker-Distributing-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32451</link>
<guid>68b1b41b63dd1d4bb13ef7c59076be56</guid>
<pubDate>Sat, 23 May 2026 00:24:53 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Baker-Distributing-Company</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fc8b0b55cdded40f757eda22ad570c61744e51bb615aba1c6284f2be6adff7f8</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>Charter-Communications-Inc.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32450</link>
<guid>b2483c130839641db1e7badbfbe9240b</guid>
<pubDate>Sat, 23 May 2026 00:24:34 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>Charter-Communications-Inc.</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b331ccc2809f782bc1607c9f5b47b7d5f462ccde559d95ada839b433c025a01b</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>DentaQuest.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32449</link>
<guid>fdf645aecfe402b2d8297ab009bbef0b</guid>
<pubDate>Sat, 23 May 2026 00:24:22 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>shinyhunters</b> claims attack for <b>DentaQuest.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f1057be8875bc84768690532522a24afef1ea3d467297b2aa5b914c9b265abd0</i><br /><br />Target victim <b>website</b>: <i>DentaQuest.com</i>]]></description>
<category>shinyhunters</category>
</item>
<item xmlns:dc='ns:1'>
<title>--</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32448</link>
<guid>46f6215956d7c46255d00263c715c9d4</guid>
<pubDate>Fri, 22 May 2026 23:51:57 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>genesis</b> claims attack for <b>--</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>765ea8380c58210ed53fe682704b4b4ee2f1d5d5844ffe15538564beceacdfe7</i><br /><br />Target victim <b>website</b>: <i>.</i>]]></description>
<category>genesis</category>
</item>
<item xmlns:dc='ns:1'>
<title>lasevillanita.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32447</link>
<guid>ef1b9b0b9c5ad1de09b779f4f97ca59b</guid>
<pubDate>Fri, 22 May 2026 22:22:56 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>krybit</b> claims attack for <b>lasevillanita.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ae56c11241405da58edb917c0db5b646156cae0bbfb9431be3d0e3efe4ee0b2</i><br /><br />Target victim <b>website</b>: <i>lasevillanita.com</i>]]></description>
<category>krybit</category>
</item>
<item xmlns:dc='ns:1'>
<title>AMACCAO</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32446</link>
<guid>8aa7db6b925810b453eb63028f4f770a</guid>
<pubDate>Fri, 22 May 2026 19:26:07 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>AMACCAO</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ccd7023cf1cf90ff3207c581fbb55cbc851e1961bd1f062145fb91be35c7839</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hoy-Construction</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32445</link>
<guid>39aca26227b4762cf59f50e09159ca84</guid>
<pubDate>Fri, 22 May 2026 19:25:41 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Hoy-Construction</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0cc06417c70258feaad0c555e62a826a207630c047e426c487ba28de09d40879</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>BMJ-Paperpack</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32444</link>
<guid>68d7496649e857a0149ab0cdd40233e2</guid>
<pubDate>Fri, 22 May 2026 18:52:30 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>worldleaks</b> claims attack for <b>BMJ-Paperpack</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>824812a46cf3ff8b6aef99d713c2191d3fcdd7cd26cf55019186918e811413f7</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>worldleaks</category>
</item>
<item xmlns:dc='ns:1'>
<title>Semgrep</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32439</link>
<guid>7b4e82cb855801d7098534835e2ca260</guid>
<pubDate>Fri, 22 May 2026 17:51:31 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Semgrep</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f44d7623c1932cf3291c103846508cafc51304657961bdf5886c14218cc942a6</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>tkgm.gov.tr</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32440</link>
<guid>cb5d9f6a68a14dea6dfeef9c4fc5ece9</guid>
<pubDate>Fri, 22 May 2026 16:50:31 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>tkgm.gov.tr</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48de05dbae556c4f3220d8d4ee6b0e186a05b470b430e32eb199c00f548a5fe7</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gitis</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32443</link>
<guid>e724e5ad0d0df625744239ef1c60e5e8</guid>
<pubDate>Fri, 22 May 2026 15:50:26 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Gitis</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>96482ac95c3c2a45f033428c5fbcfd528c34b42156d292df5813cde8001147e0</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Function-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32436</link>
<guid>6c777229ea7df5098a0a57a29558ed31</guid>
<pubDate>Fri, 22 May 2026 15:49:21 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Function-Enterprises</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>18c958105d7d88d95c7f92523db555edefef28b26411843ca25cb8950d10bfa2</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Buffalo-Niagara-Convention-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32437</link>
<guid>3faebb27540633c9d2065e5131ddf2a5</guid>
<pubDate>Fri, 22 May 2026 15:49:19 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Buffalo-Niagara-Convention-Center</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a548daa71b29f9145df648adbd3dff6c602025dc2945139fc692e5930374da35</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cablematic-Dos-Mil-SLU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32442</link>
<guid>919635985f213275b60878669bba0be0</guid>
<pubDate>Fri, 22 May 2026 15:22:25 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>gunra</b> claims attack for <b>Cablematic-Dos-Mil-SLU</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>934f5f8f00c06175f9288fbbe84cb82281c91836c06e79b3142f612df1cfc410</i><br /><br />Target victim <b>website</b>: <i>cablematic.com</i>]]></description>
<category>gunra</category>
</item>
<item xmlns:dc='ns:1'>
<title>Karlin-Foods</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32441</link>
<guid>840b3c96fad34c1bc64bb26038c3841e</guid>
<pubDate>Fri, 22 May 2026 15:20:22 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Karlin-Foods</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a4a86e92e30d2ca1398cc432619b520ae83338e699567172cc24a21c67570f92</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>minsa.com.mx</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32438</link>
<guid>08d32c7b011f031f15cf135dc6360f20</guid>
<pubDate>Fri, 22 May 2026 14:20:40 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>minsa.com.mx</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6bd8cff41524915fcd1d162b273398a4f3bcd895852fa62f2f71e26acc50bb77</i><br /><br />Target victim <b>website</b>: <i>minsa.com.mx</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>threadinnovations</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32435</link>
<guid>5557894d1bf9584f4087404f6a84866d</guid>
<pubDate>Fri, 22 May 2026 12:22:53 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>threadinnovations</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3aea75c4e6ec88c889ea85819b097ffbe1f0d4cc89ed1ac39971d8d2dd6ef8ed</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>tvnmedia.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32433</link>
<guid>dd3c407bbd2567d5d793e720ca3f2da2</guid>
<pubDate>Fri, 22 May 2026 11:51:25 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>tvnmedia.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb564de88766a2f0d9380df5aac1a665fdde686d50134f10af26136a32cbf493</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>Le-Pain-Quotidien-US</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32434</link>
<guid>5211bda24f5c44114c473a74b8bdf361</guid>
<pubDate>Fri, 22 May 2026 10:51:35 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Le-Pain-Quotidien-US</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0aeab7ad8e979d0c4bc96c7113e69f2249011713212c28e190b58085f24adba1</i><br /><br />Target victim <b>website</b>: <i>lepainquotidien.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vernon--Ginsburg</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32431</link>
<guid>be068d693cfefdf2afe808d90e2a9031</guid>
<pubDate>Thu, 21 May 2026 20:49:53 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Vernon--Ginsburg</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>928238ab1a443a3bbbdf062d2311be96fe41fae89a2067191bbd8465c5b93118</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ROTO-Immobilien</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32432</link>
<guid>3c9857798a0f7d6128d3c292102b5730</guid>
<pubDate>Thu, 21 May 2026 20:26:12 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>ROTO-Immobilien</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c31a2e918a0ee032202b276ff4fad79a0ec051610a39a4275ba6977f0e64cbc9</i><br /><br />Target victim <b>website</b>: <i>www.roto-immobilien.at</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Snyder-Packaging</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32430</link>
<guid>bd91a434de99fb29e2a74a181f06560f</guid>
<pubDate>Thu, 21 May 2026 18:25:59 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Snyder-Packaging</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>49b61fc8ebb02bf76efc6fef8734ff5cd92df8dd8c6c236996928c2130220ce3</i><br /><br />Target victim <b>website</b>: <i>www.snyderpkg.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>alkaloid.com.mk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32426</link>
<guid>fac99c77695b5655eefadf78498b8430</guid>
<pubDate>Thu, 21 May 2026 17:49:07 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>alkaloid.com.mk</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>878b20e88dacae8a5998469fe559963e8bf675e4a9baf4c841f0991ac937b872</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>narit.or.th</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32427</link>
<guid>a41c789988215311a8b922614a675764</guid>
<pubDate>Thu, 21 May 2026 17:49:06 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>narit.or.th</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99acb31c5e74db6943771a55d0895d4623109f090b80099d3ae3b14800ecb4c6</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>grupopetersen.com.ar</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32429</link>
<guid>3381294afe5973d75687e1db220d74de</guid>
<pubDate>Thu, 21 May 2026 16:22:34 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>grupopetersen.com.ar</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9a2f3e8291de8020ccd021cd309a459e761c2b6958ec1ccec871ce8dd589235e</i><br /><br />Target victim <b>website</b>: <i>grupopetersen.com.ar</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>sheppadviser.com.au</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32428</link>
<guid>c8e1d3b1704b30d49e255de822a921cf</guid>
<pubDate>Thu, 21 May 2026 15:50:23 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>BrainCipher</b> claims attack for <b>sheppadviser.com.au</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e2d4a0755dc94ab916680acbf65d42bc443a77fac47778cb4031c7a510a58622</i><br /><br />Target victim <b>website</b>: <i>sheppadviser.com.au</i>]]></description>
<category>BrainCipher</category>
</item>
<item xmlns:dc='ns:1'>
<title>Softseba</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32425</link>
<guid>f2324a6f586df773128ee09267104e8f</guid>
<pubDate>Thu, 21 May 2026 14:25:09 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Softseba</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>379df6818728e95bd88e8feeca494764b03b422cdccb3f75f5b1fe7d17c420fa</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Neubox</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32424</link>
<guid>988ce67ad8c1f1fd4facb51a89229e09</guid>
<pubDate>Thu, 21 May 2026 13:25:04 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Neubox</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>75320f0c4f049485df766ab4bd6222a001affa4a340a00e22e72d0b74945b91b</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>ungererandcompany.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32416</link>
<guid>496ad1139911eeb014d31dce575faa61</guid>
<pubDate>Thu, 21 May 2026 11:51:30 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>apt73/bashe</b> claims attack for <b>ungererandcompany.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee1a9d772d7531c4c79f4fbbf909cd20d46a62ea337aa22cdb004b0c9eadf1ec</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>apt73/bashe</category>
</item>
<item xmlns:dc='ns:1'>
<title>G-Theodor-Freese</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32423</link>
<guid>7a4a1d992bf4e98dee11852a48215193</guid>
<pubDate>Thu, 21 May 2026 10:56:07 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>G-Theodor-Freese</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>95c6db208f1978a398c4f7009d04a1bf6cc8727d4359b0bbcd51ae6513bfdc4d</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>A-Sonic-Logistic-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32422</link>
<guid>2c2c5fd01b61e3e0e687573af8f7e1fa</guid>
<pubDate>Thu, 21 May 2026 10:55:27 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>A-Sonic-Logistic-Solutions</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7f674a996e22f6c09cc96586ed7f80b240acfb54d321d26dfe5e54e5ded7b3d3</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>Internal-Medicine-and-Pediatrics-of-Cullman</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32421</link>
<guid>9191b0a3b4c41e6732dbb644bd52d6fc</guid>
<pubDate>Thu, 21 May 2026 10:26:49 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>Internal-Medicine-and-Pediatrics-of-Cullman</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6860f8ba6b96dd49b912fd7b03e428eca49cc1abd1976fc82eac34663d582795</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>Robinsons</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32420</link>
<guid>649f7e2bf4d7efb62d56f6090cf943eb</guid>
<pubDate>Thu, 21 May 2026 10:26:06 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>Robinsons</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f49ce4f9e7287aa06791c99f55b84879f52045887ce5a093bd750a89fa68a54a</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grupo-Pasquel</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32419</link>
<guid>ffb14e8b6e84eb9ad09f15443be54561</guid>
<pubDate>Thu, 21 May 2026 09:53:23 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Grupo-Pasquel</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>777e97e5b0fe525bf2394fb011c6340489e533765790acd31179c3ac98e98361</i><br /><br />Target victim <b>website</b>: <i>grupopasquel.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>MBM-Corp</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32418</link>
<guid>b17817e6bd62910a6e9016c9a58ee9bb</guid>
<pubDate>Thu, 21 May 2026 09:53:20 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>MBM-Corp</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43487e26c8d6f160ccd6b282495d481cabf5c3bc35bb991cabef8ecb234c9ec0</i><br /><br />Target victim <b>website</b>: <i>mbmcorp.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>YMCA-of-Columbia</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32417</link>
<guid>12c7c68e4e25a6bb27bcdbccf500b5fd</guid>
<pubDate>Thu, 21 May 2026 09:53:15 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>YMCA-of-Columbia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f635be55b283e505cca269001593a7e89632fdf4946a29d1780fced37bba015d</i><br /><br />Target victim <b>website</b>: <i>columbiaymca.org</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hotelogix-Company-Hotelogix.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32415</link>
<guid>5003307d211c815c97cc8bada9c6edec</guid>
<pubDate>Thu, 21 May 2026 06:22:11 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>shadowbyt3$</b> claims attack for <b>Hotelogix-Company-Hotelogix.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f3cc866474d5b0a84543208ddee986e02071a58dc2670b4ebc21ef37437383c3</i><br /><br />Target victim <b>website</b>: <i>Hotelogix.com</i>]]></description>
<category>shadowbyt3$</category>
</item>
<item xmlns:dc='ns:1'>
<title>StarBucks-Company-StarBucks.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32414</link>
<guid>5928ecabcdc8f26faaa44e79476af2f0</guid>
<pubDate>Thu, 21 May 2026 05:52:10 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>shadowbyt3$</b> claims attack for <b>StarBucks-Company-StarBucks.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed24de8fc9dd6c9b435304783fb213405cef55da288ce2db890aeaee6796df16</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shadowbyt3$</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hamer-Childs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32413</link>
<guid>ea991922e5d2d407b59be72152863092</guid>
<pubDate>Wed, 20 May 2026 23:53:22 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Hamer-Childs</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>093df5d41f3ff34cb910698c78d4cd82cea859528bd4b7e4cc488ef3295370f1</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Porter-W-Yett</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32412</link>
<guid>efc7802abcfcabf60cf5abe86e9b0465</guid>
<pubDate>Wed, 20 May 2026 20:25:16 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Porter-W-Yett</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>04006a1f49c25f1ba938892b07a0f24a8eecc496fc53e24f8bdc81eb47d2ec74</i><br /><br />Target victim <b>website</b>: <i>www.porteryett.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>WNS-Lowery</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32409</link>
<guid>929ba3c615223cf7248590ae175fcce7</guid>
<pubDate>Wed, 20 May 2026 17:53:32 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>WNS-Lowery</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4065190ecac8a03fbecfa026992aace9e0aafcfedca8778f669ff4623476d3be</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cz-Collections</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32410</link>
<guid>10e8bd26bb63fead09767e79b7ee4326</guid>
<pubDate>Wed, 20 May 2026 17:53:31 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Cz-Collections</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b029f8b49198d4c472b86559dfe809dfbafdf89494139191728e9399f611218</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>CJ-Architects</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32411</link>
<guid>d3ac43d9713bf1e9d37a453da0385b3b</guid>
<pubDate>Wed, 20 May 2026 17:53:30 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>CJ-Architects</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b73022e55510f14ae231e753870367cd4574a2061393ec7355dbe1e61ab0aa9e</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Air-Conditioning-Florida--Mrdsllc--RTE-Stucco--MR-Drywall-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32408</link>
<guid>a8fc21015db4f75ac1bc2269f1e2a58e</guid>
<pubDate>Wed, 20 May 2026 14:55:11 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Air-Conditioning-Florida--Mrdsllc--RTE-Stucco--MR-Drywall-Services</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d3629aab10eb122a8c25a9a49fe091e8bdfacb585fab3d1d0196c5d8a56c4a33</i><br /><br />Target victim <b>website</b>: <i>www.airconditioning-florida.com, www.mrdsllc.com, www.rtesllc.com, www.mrdrywallservices.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vial-Agro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32407</link>
<guid>e76fb6dc9924bee4a1f05558d0d34b3f</guid>
<pubDate>Wed, 20 May 2026 14:54:53 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Vial-Agro</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1c3ba6e86ee554d0ba4fe2b75c0a88c5055f4b0a54b6c102f888cd27b100c668</i><br /><br />Target victim <b>website</b>: <i>www.vialagro.com.ar</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Sid-Harveys</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32406</link>
<guid>50ff2b95b8b53b5f12b4dd19575edf62</guid>
<pubDate>Wed, 20 May 2026 13:52:23 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Sid-Harveys</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>16a29999d423f4dbe42f7444d7573367e022afe1436e6ac377476b0d851482e4</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Pro-Farm-Group-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32405</link>
<guid>3cab6b8b2708f469275039d7ad17380c</guid>
<pubDate>Wed, 20 May 2026 13:25:59 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Pro-Farm-Group-Inc</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6d4d0ab5968931c06d43486a872e0feff5369f565cf6266c88da6ac6f07ca25f</i><br /><br />Target victim <b>website</b>: <i>profarm.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fana-Jewelry-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32404</link>
<guid>bde4a681eceb6f2c6d01c533b80a7a6e</guid>
<pubDate>Wed, 20 May 2026 13:25:43 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Fana-Jewelry-Inc</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed9cafeca550ffcfccb2e35a889e038f325f1ffc9e545cc98d3567619e3c8b40</i><br /><br />Target victim <b>website</b>: <i>fanajewelry.com</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Indian-Creek-Valley-Water-Authority</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32403</link>
<guid>3e24e1901a29469d0f6060cb1324482c</guid>
<pubDate>Wed, 20 May 2026 13:25:27 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Indian-Creek-Valley-Water-Authority</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>caf20ae3aa321fda5f9794008f5859e7c50ea8024f349e1c0ab93937498837b8</i><br /><br />Target victim <b>website</b>: <i>icvwater.org</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Exchange-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32402</link>
<guid>e58d15cd0ff0568a0f8524fcce92b6bd</guid>
<pubDate>Wed, 20 May 2026 13:25:11 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>pear</b> claims attack for <b>Exchange-Group</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb1ec7b2b21b57844689f51b496e0810a7373a1bac0ccd2811239f5cbed69300</i><br /><br />Target victim <b>website</b>: <i>exg.ca</i>]]></description>
<category>pear</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vega</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32401</link>
<guid>f454a7da12c2fbfc12dae505f59f304b</guid>
<pubDate>Wed, 20 May 2026 12:53:25 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Vega</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>31bd6cd2936478ee252a7442cf273534f20d57585b61f7ccf7d10964f75fd7de</i><br /><br />Target victim <b>website</b>: <i>vega-corp.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>olipes.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32400</link>
<guid>da254f3712cb28c7261dbc8733d7c0ba</guid>
<pubDate>Tue, 19 May 2026 20:54:37 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>olipes.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>701b9fb2655e520c812b95c602051ff8388e3a5de7b5f419da73e21c57b9a69c</i><br /><br />Target victim <b>website</b>: <i>olipes.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>ZFG-ALTHERM-Engineering</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32396</link>
<guid>bcfcd28386825c63b4bf03cd90582cab</guid>
<pubDate>Tue, 19 May 2026 19:57:04 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>ZFG-ALTHERM-Engineering</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fd624c6a9eed1de6c598a2289ef2658cdc7c3ac1b8a858aae96e08e10986aeed</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>TAURUS-INVESTMENT-HOLDINGS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32397</link>
<guid>65d6b3b69c9122e98cfb9c6487f8438c</guid>
<pubDate>Tue, 19 May 2026 19:57:01 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>TAURUS-INVESTMENT-HOLDINGS</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9fb8dbd55166ce1a52be1eea6ca1c4c4511068e7b389bb7daf62916a5d54fc20</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nothing</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32399</link>
<guid>7143b3c23169789d1d83178002a9b07f</guid>
<pubDate>Tue, 19 May 2026 19:52:35 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>Nothing</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2ad1d195370e2046ec792fc92539729d597ec026d6df1b5c8f5b0cdf7a17089a</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Wysza-Szkoa-Biznesu-National-Louis-University</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32398</link>
<guid>1b2b9dde67ac01d28e6f13e361008545</guid>
<pubDate>Tue, 19 May 2026 18:33:59 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Wysza-Szkoa-Biznesu-National-Louis-University</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d03cd2aa1d376359454a816116beefdf6b5056224525624c8d644b9cea05681a</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Acton-Electrical</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32386</link>
<guid>32492a842010652919d07f02c6de8608</guid>
<pubDate>Tue, 19 May 2026 17:57:47 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Acton-Electrical</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>790c1260cede4b7cb4ac26008dd8c37a8af3da2156f6fb92b12d960f5202d963</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>jec.co.id</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32387</link>
<guid>6fddc5cb7045037050c550acf1b6d183</guid>
<pubDate>Tue, 19 May 2026 17:12:56 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>jec.co.id</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6dfe7fd5409abfe9d8b98b0409bda5f0746c0fde66155f3b953274d4987613a4</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>santoinacio-rio.com.br</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32388</link>
<guid>8c2208cf33090f61a75c8dbfdf78b61b</guid>
<pubDate>Tue, 19 May 2026 17:12:55 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>santoinacio-rio.com.br</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7d2782348c94ec6113591ae234c69affb89966c0195509fa44aec9c9006ab5db</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>lbreng.com.br</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32389</link>
<guid>81361e46e82b342fd6c3fce3d49106a4</guid>
<pubDate>Tue, 19 May 2026 17:12:54 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>lbreng.com.br</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8effa8916b543141d4f5aa5e9d5eb4d89196481c6e88a73243a01575d565f7b</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>stahlwille.nl</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32390</link>
<guid>34a95ac7da1b09da18951116349397c4</guid>
<pubDate>Tue, 19 May 2026 17:12:53 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>stahlwille.nl</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>01c68cd74389b5593b5970f1c1c45715725e1b21dcb12c54174e31574ffc2061</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>shougang.com.pe</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32391</link>
<guid>cc6e5bde3f689df1473a02c463ebb11e</guid>
<pubDate>Tue, 19 May 2026 17:12:52 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>shougang.com.pe</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>466296aa01a628d7b79a0ce38477f1f252a8d221b4245ab959e2e1d6bbf34167</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>centralromana.com.do</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32392</link>
<guid>15b33319db65d343906d085ba0500783</guid>
<pubDate>Tue, 19 May 2026 17:12:51 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lockbit5</b> claims attack for <b>centralromana.com.do</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8543fc165e7dd51954bd9680c71da11b81a91168c866eac5b5d259ea47510f01</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>lockbit5</category>
</item>
<item xmlns:dc='ns:1'>
<title>TSG-Enterprises</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32393</link>
<guid>dfaf0f333b6b70de28eaf291774d94db</guid>
<pubDate>Tue, 19 May 2026 16:57:56 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>TSG-Enterprises</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99667a40c03877135f040a47c590d50337558c5c687bc0bd301b9cbd0504390c</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Barclay-Damon</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32395</link>
<guid>f08bc848e028e7f9d65567f2ddc15951</guid>
<pubDate>Tue, 19 May 2026 16:51:05 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>SilentRansomGroup</b> claims attack for <b>Barclay-Damon</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9162e6217817a793ba44dea6451b672a355bbfd3d12a824c794e781c7cb36f88</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>SilentRansomGroup</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zuther-Hautmann</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32394</link>
<guid>99d86f4ed61dbbb54fe8caef653f8498</guid>
<pubDate>Tue, 19 May 2026 14:53:55 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>play</b> claims attack for <b>Zuther-Hautmann</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0d33c5926ea515b39373947bbac64a8aad0eb3314fdc3b6922ad70407c3e065e</i><br /><br />Target victim <b>website</b>: <i>www.z-h.de</i>]]></description>
<category>play</category>
</item>
<item xmlns:dc='ns:1'>
<title>RADWAG</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32385</link>
<guid>8e9a0e5f19caa707db6dfae2a3551504</guid>
<pubDate>Tue, 19 May 2026 13:56:48 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>RADWAG</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>072db89055dbfa1143cdb98f2915fb892a5b14562a82aec8555995002464b439</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>ROTHTECHNIK-AUSTRIA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32384</link>
<guid>f41f94e3576a8e292c03201210b90cbb</guid>
<pubDate>Tue, 19 May 2026 13:23:47 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lamashtu</b> claims attack for <b>ROTHTECHNIK-AUSTRIA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>43711bbde9b7cf8d6692663fc6f5a3a0afdb54abcc220d8056d7d3e8182f2632</i><br /><br />Target victim <b>website</b>: <i>rothtechnik.eu</i>]]></description>
<category>lamashtu</category>
</item>
<item xmlns:dc='ns:1'>
<title>SARL-CANIS-EVENTS-SCURIT-PRIVE</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32383</link>
<guid>7cab59661cfaa9701dba0ee2d13eb25f</guid>
<pubDate>Tue, 19 May 2026 12:53:10 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>krybit</b> claims attack for <b>SARL-CANIS-EVENTS-SCURIT-PRIVE</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>163341dca7bf9498a9647be35ff74acd961171400bb46df47873972060ba088a</i><br /><br />Target victim <b>website</b>: <i>SARL CANIS EVENTS SÉCURITÉ PRIVÉE</i>]]></description>
<category>krybit</category>
</item>
<item xmlns:dc='ns:1'>
<title>nacs.com.hk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32382</link>
<guid>1d304d9c141c271cd60a9cb5ac5e862b</guid>
<pubDate>Tue, 19 May 2026 12:52:56 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>krybit</b> claims attack for <b>nacs.com.hk</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>79d8d909de9f99e028e80adde43f157dd0dd6fabaaaa693a9b579be9ae4bf21b</i><br /><br />Target victim <b>website</b>: <i>nacs.com.hk</i>]]></description>
<category>krybit</category>
</item>
<item xmlns:dc='ns:1'>
<title>mindmastersg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32381</link>
<guid>cc95aa39a060194468cf78fa7dc1cb99</guid>
<pubDate>Tue, 19 May 2026 12:52:42 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>krybit</b> claims attack for <b>mindmastersg.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1299cfe6f59b58774c8aecd52bb5e7d3429118e59c829e5d6e026c49c97534a5</i><br /><br />Target victim <b>website</b>: <i>mindmastersg.com</i>]]></description>
<category>krybit</category>
</item>
<item xmlns:dc='ns:1'>
<title>Landeshauptstadt-Stuttgart</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32380</link>
<guid>a5d3526558368a8cda8a30a3c35963cb</guid>
<pubDate>Tue, 19 May 2026 10:24:33 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Landeshauptstadt-Stuttgart</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8dc5c740277e7e451d47aac56022951e31fe92bc6de8cb969eb2696ca7ce4e23</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Veda-Consulting-Company</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32379</link>
<guid>2f9fb60d8cd21c36765ffb4c04a86f35</guid>
<pubDate>Tue, 19 May 2026 10:24:21 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Veda-Consulting-Company</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7207b407dc61f22fa0bf38567265bfa5693efda8103a2e56d41351e16eae1ef9</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tang-Seng-Nitrogen--Pump-Systems-Pte.-Ltd.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32378</link>
<guid>0ddb6b8a7a5a3fdece94e55dea899444</guid>
<pubDate>Tue, 19 May 2026 08:23:28 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>Tang-Seng-Nitrogen--Pump-Systems-Pte.-Ltd.</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3e0fd367156a0ad8b5c90e545a3fd47d8d648170e37e2cdda911597af4a2f2bc</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>Elohim-Law-Corporation</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32377</link>
<guid>c8e48afc4b04bd84c86db33b225828a4</guid>
<pubDate>Tue, 19 May 2026 08:22:59 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>Elohim-Law-Corporation</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bca667ca445451f3c0d9f3c972c16ad5623deda86455491e3688bb4fccd60807</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>Kabushiki-Gaisha-Hodozuka-Setsubi</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32376</link>
<guid>2e93fad1e91614dbea27879646a09bd6</guid>
<pubDate>Tue, 19 May 2026 07:54:32 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>payload</b> claims attack for <b>Kabushiki-Gaisha-Hodozuka-Setsubi</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>60353cef7a94cca616ef39c8717dea5bf8d157499b48161e35415e083335b10d</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>payload</category>
</item>
<item xmlns:dc='ns:1'>
<title>Nordfjord-Hotell</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32375</link>
<guid>035f5a5a474f2131ccbfe12d0a0fa0af</guid>
<pubDate>Tue, 19 May 2026 01:55:14 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Nordfjord-Hotell</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d9110aa29ec4890ff9b3274be6f2f008751ff28ec32de1e6f595f1eddfc625a1</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Asian-Lite-International</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32374</link>
<guid>e37e72799cdab4e611dc2bdcaa9a6cc4</guid>
<pubDate>Tue, 19 May 2026 01:25:00 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Asian-Lite-International</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b7e60e48d33562b89515adc8f4f53f3791b1179e0d816b9dffcb13e639da66f4</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>harrisoncountywv.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32373</link>
<guid>bf9b2fc7786695d23d420b323f28c613</guid>
<pubDate>Mon, 18 May 2026 20:24:26 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>harrisoncountywv.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>618502c461383498c43bffd9022b29c17850016541a24b2feb4afe5ed8a0eb2f</i><br /><br />Target victim <b>website</b>: <i>harrisoncountywv.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>printroom.co.uk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32372</link>
<guid>893f93375b0b69ee6854a8c70aa78689</guid>
<pubDate>Mon, 18 May 2026 19:55:43 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>printroom.co.uk</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e24fef0112543bdd379ac9e16aee4e77a8e64a5a31f8090df162675a05faa0fb</i><br /><br />Target victim <b>website</b>: <i>printroom.co.uk</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>hautarzt-budihardja.de</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32371</link>
<guid>4a5f2f97a1b87bd418876e88d42f1bfa</guid>
<pubDate>Mon, 18 May 2026 19:55:18 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>hautarzt-budihardja.de</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0853e5acda5c394d14b1124da99087ed28a3666e542bb7fd3d72777bbe3d99e7</i><br /><br />Target victim <b>website</b>: <i>hautarzt-budihardja.de</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>mediafrance.de</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32370</link>
<guid>1af762c872080b066c4cd5ec1663ba91</guid>
<pubDate>Mon, 18 May 2026 19:54:53 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>mediafrance.de</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b437c915067a4a8dfc9f2f784c53046784835e5887c52150a6c893eb2d32e38</i><br /><br />Target victim <b>website</b>: <i>mediafrance.de</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gartengestaltung-Muller-eU</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32347</link>
<guid>d877f2827995cb75c1cb8ea5cc55c0cd</guid>
<pubDate>Mon, 18 May 2026 19:54:30 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Gartengestaltung-Muller-eU</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e385d7fadad4e11bced67db51f5310a76609f47c5133d5b4720581a45cc278ab</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>RCR-Industrial-Flooring</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32348</link>
<guid>f9d4db83a14224fd1bf3055bf98c2678</guid>
<pubDate>Mon, 18 May 2026 19:54:29 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>RCR-Industrial-Flooring</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4be1ed0aa7ad53bfcbe6421d642528837edc310455ccff34f4de6a6c51431466</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>ashleytimber.co.uk</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32369</link>
<guid>c940d2fd9b40144a1f97ac8883514a8c</guid>
<pubDate>Mon, 18 May 2026 19:54:28 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>ashleytimber.co.uk</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8b53d17e125b8417f72328d5cfc4c0caefe9d8cb940f764fc7dcace769e56ec</i><br /><br />Target victim <b>website</b>: <i>ashleytimber.co.uk</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>adlan.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32368</link>
<guid>bafe9fd85b8a42c45540de606eb57534</guid>
<pubDate>Mon, 18 May 2026 19:24:12 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>adlan.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>244b61e8b4a61a5980619443f4002e3804b8137fbc01e400b73619076e014232</i><br /><br />Target victim <b>website</b>: <i>adlan.com</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vantage-Energy-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32367</link>
<guid>403ce9727d471b1f704be4396af294ac</guid>
<pubDate>Mon, 18 May 2026 18:55:28 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Vantage-Energy-LLC</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d625ca7ab4f6f8ae6cb9fd499800e36c855183eba553b1c9b80fc599191d3aa0</i><br /><br />Target victim <b>website</b>: <i>www.vantageenergy.com</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Cro-Tucn</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32366</link>
<guid>8ac95544093983249829baf38f28cb25</guid>
<pubDate>Mon, 18 May 2026 18:55:16 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Cro-Tucn</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>995ec68b829ff6eb78cd0eb5f0cb24739410f993607ecb4ffae37c5fca3718a4</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>moul</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32365</link>
<guid>c0a548618470886d5ede7c28362a19db</guid>
<pubDate>Mon, 18 May 2026 18:55:02 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>moul</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ee749f992090d003ab75d9bd3abe12fc12bd15b20d75a1a1d36034579191cd64</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Internal-Medicine</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32364</link>
<guid>d89775f1bee30df5043cf5673a197ce0</guid>
<pubDate>Mon, 18 May 2026 18:54:53 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Internal-Medicine</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4951b44921f8fdc179f542f212a16d8918a242aa7ea957ad4e119f46a2b838f7</i><br /><br />Target victim <b>website</b>: <i>internalmedicineofswf.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Polyrack</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32363</link>
<guid>fb56dbb3fc544eb96bc92ed51b8e5f94</guid>
<pubDate>Mon, 18 May 2026 18:54:38 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Polyrack</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>56384bd04aa73131e5fc6c6ec7d1da444459f1a8bdab4864c8c93ada1a5f35ba</i><br /><br />Target victim <b>website</b>: <i>polyrack.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Internet-Technologies-Designs</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32362</link>
<guid>a6bebbe36e02bb16c654383299bc7740</guid>
<pubDate>Mon, 18 May 2026 18:54:18 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Internet-Technologies-Designs</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dff8a3c6913d4b06ae6491c5a35924e1768c2441165b5707842c98c617f1a970</i><br /><br />Target victim <b>website</b>: <i>itd-system.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>E-Control-Systems</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32361</link>
<guid>ea7fe912d5c09bd9597f4b03217e8fff</guid>
<pubDate>Mon, 18 May 2026 18:54:05 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>E-Control-Systems</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0fe7a53141813a1185ffb2b43853142ccf2effe6efa69862cacb129fcab20a3e</i><br /><br />Target victim <b>website</b>: <i>econtrolsystems.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>DEVO-Tech</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32360</link>
<guid>b6c0ad241e762099a0a6706761975ec6</guid>
<pubDate>Mon, 18 May 2026 18:53:51 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>DEVO-Tech</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>997f8b42ba617a585805679c6c1e7c88d182b7528dcf35ebcdc4fd8a08dbe5ce</i><br /><br />Target victim <b>website</b>: <i>devo-tech.ch</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Modern-Display</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32359</link>
<guid>6ffbb022729a7e0f41cf74c280927314</guid>
<pubDate>Mon, 18 May 2026 18:53:36 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Modern-Display</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>379814c63b365d9d9859540d19b5b5bd03017fc24eeaff554de82b6377118ad8</i><br /><br />Target victim <b>website</b>: <i>moderndisplay.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>University-of-Finance-and-Administration</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32358</link>
<guid>454ff46780a58d90242d4a987af54633</guid>
<pubDate>Mon, 18 May 2026 18:53:20 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>University-of-Finance-and-Administration</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6a55ba9caa60a6430d0e1bd59f13b11b9b73fdc598a81a9609743ef183d61760</i><br /><br />Target victim <b>website</b>: <i>vsfs.cz</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Huse-Incorporated</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32357</link>
<guid>3e43837dc774ebfbd1ccc4801237041d</guid>
<pubDate>Mon, 18 May 2026 18:24:01 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>Huse-Incorporated</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ed8cc3d08f1abb9b3d5963c8ba12fea77fe1172e24762d99a9e863321ca96f1e</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>TAKOSAN-OTOMOBIL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32356</link>
<guid>a377a022498719f6566b287f2bff012e</guid>
<pubDate>Mon, 18 May 2026 18:23:59 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nightspire</b> claims attack for <b>TAKOSAN-OTOMOBIL</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>524c18051e454dbfc674e673c9a7ac8081a346c8ee1b65607be7496de6644f4c</i><br /><br />Target victim <b>website</b>: <i>www.takosan.com.tr/en</i>]]></description>
<category>nightspire</category>
</item>
<item xmlns:dc='ns:1'>
<title>Mezta-Corporativo-S.A.-de-C.V.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32355</link>
<guid>94a5786ab77da70f68a0a0d4e8ba9dc3</guid>
<pubDate>Mon, 18 May 2026 18:00:00 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>titan</b> claims attack for <b>Mezta-Corporativo-S.A.-de-C.V.</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb8e7578caa5d4ad5655f10a7c4a2738d1b0ea8af264a5348e2c14bb73ab836b</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>titan</category>
</item>
<item xmlns:dc='ns:1'>
<title>Abp-Autoricambi-Srl</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32354</link>
<guid>6b00b5b0d11ce52eb21b3e33d464dd83</guid>
<pubDate>Mon, 18 May 2026 17:59:25 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>titan</b> claims attack for <b>Abp-Autoricambi-Srl</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>cb2620d10a83839d0947be029c6182fea52217bcbc41a04ebce677243787a65e</i><br /><br />Target victim <b>website</b>: <i>www.abpautoricambi.it</i>]]></description>
<category>titan</category>
</item>
<item xmlns:dc='ns:1'>
<title>DFI-AMERICA-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32353</link>
<guid>0028a24e18e166c292689023e6c22e09</guid>
<pubDate>Mon, 18 May 2026 17:58:44 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>titan</b> claims attack for <b>DFI-AMERICA-LLC</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ad00e3a3d12d44b5da20c8d778c6edb64ed1c66092da95eb05c9ccb0b55c99cb</i><br /><br />Target victim <b>website</b>: <i>www.dfi.com</i>]]></description>
<category>titan</category>
</item>
<item xmlns:dc='ns:1'>
<title>CRIT-Tunisie</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32352</link>
<guid>c824e56328b7c29d800c8c1523d009e2</guid>
<pubDate>Mon, 18 May 2026 17:58:05 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>titan</b> claims attack for <b>CRIT-Tunisie</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>830f9eb878369bdf4c84a4ef1d8e4059f901c8186089ea3b93b32947546d8e9a</i><br /><br />Target victim <b>website</b>: <i>www.crit-tunisie.net</i>]]></description>
<category>titan</category>
</item>
<item xmlns:dc='ns:1'>
<title>Groupe-CRIT-SA</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32351</link>
<guid>0efe26971685ce5755740cbfaae04e7c</guid>
<pubDate>Mon, 18 May 2026 17:57:18 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>titan</b> claims attack for <b>Groupe-CRIT-SA</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06c162432124c86d6ae198d37a2bc155075b201932cabd972ceefb397ba291d0</i><br /><br />Target victim <b>website</b>: <i>www.groupe-crit.com</i>]]></description>
<category>titan</category>
</item>
<item xmlns:dc='ns:1'>
<title>ETM-ELECTROMATIC-INC.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32350</link>
<guid>7f945d34e708a2a6a192697de248fd77</guid>
<pubDate>Mon, 18 May 2026 17:56:32 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>titan</b> claims attack for <b>ETM-ELECTROMATIC-INC.</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ddbb6cdc01176b1408badc07185a18a1a7518c4774fdf044a7dd79d20265d07f</i><br /><br />Target victim <b>website</b>: <i>www.teledyneetm.com</i>]]></description>
<category>titan</category>
</item>
<item xmlns:dc='ns:1'>
<title>Quahe-Woo--Palmer-LLC</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32349</link>
<guid>2ed6f8773d6adc2285a4d98d10bc228c</guid>
<pubDate>Mon, 18 May 2026 17:55:50 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>titan</b> claims attack for <b>Quahe-Woo--Palmer-LLC</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0c79113251ccdbf2ebdf278dde9f08b8e681c06da4e318f7a8c2bd3aa9fcac84</i><br /><br />Target victim <b>website</b>: <i>www.qwp.sg</i>]]></description>
<category>titan</category>
</item>
<item xmlns:dc='ns:1'>
<title>Berlinmobil.de</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32346</link>
<guid>949e6667758e0ad6d5c27933d9aa8ef3</guid>
<pubDate>Mon, 18 May 2026 15:55:06 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>safepay</b> claims attack for <b>Berlinmobil.de</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b52a9ec733afe4d4ccfcd645bf2e91fe4d267edd1068207d2ac618291046aff</i><br /><br />Target victim <b>website</b>: <i>Berlinmobil.de</i>]]></description>
<category>safepay</category>
</item>
<item xmlns:dc='ns:1'>
<title>Vacu---Lug</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32344</link>
<guid>37db66c660124c61c9516cf488344005</guid>
<pubDate>Mon, 18 May 2026 15:53:38 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Vacu---Lug</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>937cb6b25d2ef8843f2416551e349ddcaebd7aa8e6c5ce723b86e56009bc578a</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Healthtrax-Fitness--Wellness</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32345</link>
<guid>2877b49ebb731389a1a583bda03540bd</guid>
<pubDate>Mon, 18 May 2026 13:50:18 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Healthtrax-Fitness--Wellness</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0036021d030d532723563e5d33cab938dddce355801d436a7b0e95cd4994774d</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stonehenge-Therapeutic-Community</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32343</link>
<guid>bd2f126f7692c68f8441253586199ed8</guid>
<pubDate>Mon, 18 May 2026 10:50:23 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>cmdorganization</b> claims attack for <b>Stonehenge-Therapeutic-Community</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a568bf00b8c76dd0ea4ca4113be450472eb84c8e50f5e49a45227ee515ca1d45</i><br /><br />Target victim <b>website</b>: <i>www.stonehengetc.com</i>]]></description>
<category>cmdorganization</category>
</item>
<item xmlns:dc='ns:1'>
<title>Design-Engineering--Consulting</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32342</link>
<guid>06ef2caafa6e7dff1bb9e4a480ded51f</guid>
<pubDate>Mon, 18 May 2026 10:50:05 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Design-Engineering--Consulting</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ee7cc41b45f17fe5c1d8ac45671f38cf46040771930fe2dc163da7e17d95ab8</i><br /><br />Target victim <b>website</b>: <i>decusa.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>Jazz-Hipster</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32341</link>
<guid>18a5c4f427aa2a3153149069672e626a</guid>
<pubDate>Mon, 18 May 2026 10:20:05 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>AiLock</b> claims attack for <b>Jazz-Hipster</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5f19fb3fb92fd1d54e40fe33a9a9393bc5f19b915d99679358e79873b581bd9e</i><br /><br />Target victim <b>website</b>: <i>jazzhipster.com</i>]]></description>
<category>AiLock</category>
</item>
<item xmlns:dc='ns:1'>
<title>MSC-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32340</link>
<guid>f70f6a300c127cd38fe084c40325e479</guid>
<pubDate>Mon, 18 May 2026 07:25:16 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lamashtu</b> claims attack for <b>MSC-Group</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a067f7ee37f45276e20a205a6aaa828945e4c6e1ccbeab5687d97c1fb2454f8d</i><br /><br />Target victim <b>website</b>: <i>msmelt.com</i>]]></description>
<category>lamashtu</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trsor-Public</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32339</link>
<guid>63b86b88a630f503d6508ebea2945200</guid>
<pubDate>Mon, 18 May 2026 04:20:17 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>AuditTeam</b> claims attack for <b>Trsor-Public</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14681f19e653ff919a7412a04ca3caafac03a475f7bced758c2efd6d81ab28f9</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>AuditTeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>bergen1.net</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32338</link>
<guid>5f9491903a313d3a99f8f9bb101d1b89</guid>
<pubDate>Mon, 18 May 2026 01:22:31 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>bergen1.net</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>71b63c5e05fb9847b3ec8d637fe4a8b74abe7ad1c180fefb30d2766107b3f03b</i><br /><br />Target victim <b>website</b>: <i>bergen1.net</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>challenge-mfg.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32337</link>
<guid>93c89a4b9cb44ca5abe30785d226d695</guid>
<pubDate>Sun, 17 May 2026 19:52:16 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>challenge-mfg.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d94302e0042cc228a0c7019be79dee5d9d9347e54da4d1b9b348f893fbf54cd8</i><br /><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/challenge-manufacturing-co/1137810885</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>wtitransport.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32336</link>
<guid>9917c3b8ac1b209796960d2a2f0f7931</guid>
<pubDate>Sun, 17 May 2026 19:51:51 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>wtitransport.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bde6d4fb114ca19aea46f1378c067ea0866ed7fad98508a3c76bdd6b60d997e6</i><br /><br />Target victim <b>website</b>: <i>www.wtitransport.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>cstindustries.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32335</link>
<guid>74061f08793737e9374dd85cd2233d3c</guid>
<pubDate>Sun, 17 May 2026 19:51:24 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>cstindustries.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b5d8ae5ec1f26bcc0bba28f2147620285649d0732a3a49c6a89f168b20f098ad</i><br /><br />Target victim <b>website</b>: <i>www.zoominfo.com/c/cst-industries-inc/28282428|</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>fallprotect.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32334</link>
<guid>fddb49982f360e8a94aa8642ed545a16</guid>
<pubDate>Sun, 17 May 2026 19:50:58 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>chaos</b> claims attack for <b>fallprotect.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>af5ca961e769ab2094a855aa24b2327fa5347207ca042c41c3ed6bdf586cb187</i><br /><br />Target victim <b>website</b>: <i>www.fallprotect.com</i>]]></description>
<category>chaos</category>
</item>
<item xmlns:dc='ns:1'>
<title>Salter-HealthCare</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32327</link>
<guid>87c1e97c0925d13e8eaf3276fec6769a</guid>
<pubDate>Sun, 17 May 2026 19:50:05 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Salter-HealthCare</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>99e7f8a9dffe3d6413218d80bc8b0f99601c500cd3d2078c98c82a09352ef0dc</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Majlis-Perbandaran-Alor-Gajah</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32328</link>
<guid>47a3ca0821bb3906081b7073038d350b</guid>
<pubDate>Sun, 17 May 2026 19:50:04 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Majlis-Perbandaran-Alor-Gajah</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>df4489dbf447c86fe440db961bfd1c4e344b081d61a5956a184d75f731633880</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Monir-Precision-Monitoring</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32329</link>
<guid>57caecc41d16f82e2309eb7abae3886a</guid>
<pubDate>Sun, 17 May 2026 19:50:02 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Monir-Precision-Monitoring</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>181579882feaa22a8c272f291245941c6e507bb7cb685fa621e287e86a12083c</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Buckeye-Paper</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32333</link>
<guid>ec43638b66e16a5bbede9b710b12b0c7</guid>
<pubDate>Sun, 17 May 2026 18:25:09 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Buckeye-Paper</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2e8d4205cfe871aacbdb08a48b434fbf98636e76029eff19bc6a9e4dce92f45e</i><br /><br />Target victim <b>website</b>: <i>www.buckeyepaper.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Muse-du-Bas-Saint-Laurent</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32332</link>
<guid>61d084d8e03e1012a86b3635549fe59d</guid>
<pubDate>Sun, 17 May 2026 18:24:43 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Muse-du-Bas-Saint-Laurent</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b3f4794447b13f41840f5d6e07858dd58aeec15a54c6bfae47bb8d5f8f75d392</i><br /><br />Target victim <b>website</b>: <i>www.mbsl.qc.ca</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fruits-Queralt</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32331</link>
<guid>80b7b0e690b99b5246e4b11990fb8184</guid>
<pubDate>Sun, 17 May 2026 18:24:12 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Fruits-Queralt</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>4c8081a98441dc9bf525378d37c03fdb5e45518db2c488eec6e81473ea049272</i><br /><br />Target victim <b>website</b>: <i>www.fqueralt.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>The-Taylor-Provisions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32330</link>
<guid>0507ea3f897987f62fc8619ae288236f</guid>
<pubDate>Sun, 17 May 2026 17:53:12 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>The-Taylor-Provisions</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1252a3c5478d016d708ee7a614004636a882fed7c4866b6c1aaa80484f586b07</i><br /><br />Target victim <b>website</b>: <i>www.originaltaylorporkroll.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>BAUM-Games</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32326</link>
<guid>5d904c056ee171ce7a126a71d7ac507d</guid>
<pubDate>Sun, 17 May 2026 15:23:18 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>BAUM-Games</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0b96da733031f090805dd75cd3a1c544b34dc53f3eee97d3247a52d2ce8377a0</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>Don-Bosco-Technical-Institute-of-Makati</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32325</link>
<guid>6b7f18f1f939115a1bd761ec64bd2c55</guid>
<pubDate>Sun, 17 May 2026 14:55:02 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>Don-Bosco-Technical-Institute-of-Makati</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>386a951ca28df498ae5bb229fb06afdede18b142b2ad60a9eb8621dfa68d7320</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>dosocho.es</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32324</link>
<guid>4a9f2c433adcc2698ba7704faedeaf82</guid>
<pubDate>Sun, 17 May 2026 14:54:18 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>dosocho.es</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>d5625889d9604482f2e12de413e602fb1f370e13a43b783ff6574df051178c5b</i><br /><br />Target victim <b>website</b>: <i>dosocho.es</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>soft-inc.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32323</link>
<guid>5f6eb0809f31e88067e51bfd2bb0c50e</guid>
<pubDate>Sun, 17 May 2026 14:53:47 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>soft-inc.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>315c68ad66d1150007bc150399932d5f4a264748a1b26c71833f9d2c8ea4f4a4</i><br /><br />Target victim <b>website</b>: <i>soft-inc.com</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Plan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32322</link>
<guid>77050e6fc4141c7d1457f36e3fc6f821</guid>
<pubDate>Sun, 17 May 2026 14:52:04 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Plan</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>bfa24338d80bbd43c48ed39daa3d357adf972810b7ae319b1411ecacfad79b6f</i><br /><br />Target victim <b>website</b>: <i>plan.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>psbsementi.it</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32321</link>
<guid>5887aebfeedcde5c7a690992128111da</guid>
<pubDate>Sun, 17 May 2026 14:24:04 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>psbsementi.it</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>61bbb3701395671a6d3e92c4644fcaeeae83af31488909fa8fb73ce197ca036e</i><br /><br />Target victim <b>website</b>: <i>psbsementi.it</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>grupo55.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32320</link>
<guid>b02c1aa1ed3db1bf3ff447e6292aaa3a</guid>
<pubDate>Sun, 17 May 2026 14:23:33 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>m3rx</b> claims attack for <b>grupo55.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>675493cd72e43e46c2d9665046cc5a24048a07c0d3e9939d97ea6654800db7bf</i><br /><br />Target victim <b>website</b>: <i>grupo55.com</i>]]></description>
<category>m3rx</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ingelan</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32319</link>
<guid>5fa81016250471111dfca121ae9cdc14</guid>
<pubDate>Sun, 17 May 2026 14:21:42 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Ingelan</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>282ead33b2671768cad9e0c1b10c66a4e1e3cb4330862d0019c1d65740f59cf1</i><br /><br />Target victim <b>website</b>: <i>ingelan.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Holy-Name-of-Jesus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32318</link>
<guid>e5f6c8ca67571d3496e7e6609a197521</guid>
<pubDate>Sun, 17 May 2026 13:50:10 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>cmdorganization</b> claims attack for <b>Holy-Name-of-Jesus</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>f81f437a8e5ac36d5d1500b022573ff58eb1aaa6288ac7402083947966af32b2</i><br /><br />Target victim <b>website</b>: <i>www.theholynameofjesus.org</i>]]></description>
<category>cmdorganization</category>
</item>
<item xmlns:dc='ns:1'>
<title>URG-OEM</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32317</link>
<guid>70a46919ffec2a1fe70c2d18aa6289d3</guid>
<pubDate>Sun, 17 May 2026 12:23:35 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>nova</b> claims attack for <b>URG-OEM</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9378686a51c94eb3de362fe65e7e8b589ddeb78894fe484994dd82f243828189</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>nova</category>
</item>
<item xmlns:dc='ns:1'>
<title>PNSB-Insurance-Brokers-Sdn-Bhd</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32315</link>
<guid>4fe9b99a93f17369b95f15d8d806128a</guid>
<pubDate>Sun, 17 May 2026 11:51:38 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>PNSB-Insurance-Brokers-Sdn-Bhd</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>be1111f33059075efbd09101ababcffa2fcae3619a2bab271e4522aca3441cc0</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>metaval.com.au</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32316</link>
<guid>9d0231d43ebb66349e1bd614cba89796</guid>
<pubDate>Sun, 17 May 2026 11:23:05 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>metaval.com.au</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>28b99dce8c1be39fac581bb2e71e5ae703b770122acaaf5bbadfe02f8dccfc71</i><br /><br />Target victim <b>website</b>: <i>metaval.com.au</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Comercial-Echave-Turri-Limitada</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32314</link>
<guid>dd39fad8b6d919682beca3fe8af879d3</guid>
<pubDate>Sun, 17 May 2026 08:24:09 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Comercial-Echave-Turri-Limitada</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ece0b9206ad7664fab253de183d34cc9ddc9f482f2f02d386ad34b077e218e2b</i><br /><br />Target victim <b>website</b>: <i>www.ajj.cl</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Trivantage</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32313</link>
<guid>ed1c1607401e06c70d9e92918ddd9934</guid>
<pubDate>Sat, 16 May 2026 21:50:56 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>beast</b> claims attack for <b>Trivantage</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>873bacee65731c532a8401cb812b6409c1dfef371a50c30d002512732e909b37</i><br /><br />Target victim <b>website</b>: <i>www.trivantage.com</i>]]></description>
<category>beast</category>
</item>
<item xmlns:dc='ns:1'>
<title>Parle-Agro</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32312</link>
<guid>3ec501b562c6038d2ffabafcbac37cd3</guid>
<pubDate>Sat, 16 May 2026 19:22:52 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>lamashtu</b> claims attack for <b>Parle-Agro</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>90b0ff1514146e2c8ed10af39b5c9c062a97c8221b78c5a0093d8a6568384065</i><br /><br />Target victim <b>website</b>: <i>parleagro.com</i>]]></description>
<category>lamashtu</category>
</item>
<item xmlns:dc='ns:1'>
<title>RAMAR-FOODS-INTERNATIONAL</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32311</link>
<guid>081858e42df3e2ac683f842e34831256</guid>
<pubDate>Sat, 16 May 2026 18:54:03 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>termite</b> claims attack for <b>RAMAR-FOODS-INTERNATIONAL</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a10fd8c6ef98e3236b5b43cb30adc0819b7fe76c0036f87ca05636a8584b0eb5</i><br /><br />Target victim <b>website</b>: <i>www.ramarfoods.com</i>]]></description>
<category>termite</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ross-Yerger-Insurance</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32310</link>
<guid>0183e4f6ecf3efd66438a27cb4ec2d68</guid>
<pubDate>Sat, 16 May 2026 18:00:40 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Ross-Yerger-Insurance</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a40bf1bde50c9c2ef0db1c5f204954550381516bc365d6958f4b01243de0662e</i><br /><br />Target victim <b>website</b>: <i>rossandyerger.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>CLINICA-AVELLANEDA-MEDICAL-CENTER</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32309</link>
<guid>56c7f7435d8e6860ca392b2b06d5643f</guid>
<pubDate>Sat, 16 May 2026 17:54:10 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>CLINICA-AVELLANEDA-MEDICAL-CENTER</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dca16104bbb16542db3a7907a14f9450073987b01351a57ee5105bb3082bf4a5</i><br /><br />Target victim <b>website</b>: <i>CLINICA AVELLANEDA MEDICAL CENTER</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Transitions-Pro-Centre-Val-de-Loire</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32308</link>
<guid>8c4fcd64d8c6e62de9d8496a0b7c33f8</guid>
<pubDate>Sat, 16 May 2026 17:25:37 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>PrinzEugen</b> claims attack for <b>Transitions-Pro-Centre-Val-de-Loire</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6fcb6ec551c908dfbe39158d569df2477297aceb85082c0149f3b608564bb3e7</i><br /><br />Target victim <b>website</b>: <i>transitionspro-cvl.fr</i>]]></description>
<category>PrinzEugen</category>
</item>
<item xmlns:dc='ns:1'>
<title>AdvancedHEALTH.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32307</link>
<guid>7666534473231043db00bea461f55d33</guid>
<pubDate>Sat, 16 May 2026 15:51:26 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>AdvancedHEALTH.</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>14acf136784fc1ba594cd691d4e9d0de6fabc4f75b1c7ad07defa0ad3e195f58</i><br /><br />Target victim <b>website</b>: <i>ouradvancedhealth.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Gastroenterology--Hepatology-of-CNYFULLLEAK</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32306</link>
<guid>fbd2367b610709a34ef4bb9605ec5ba9</guid>
<pubDate>Sat, 16 May 2026 15:22:12 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>exitium</b> claims attack for <b>Gastroenterology--Hepatology-of-CNYFULLLEAK</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>57e32c8f7247945f40871bc746470c81361fc595358535e6c39c43c90760ee09</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>exitium</category>
</item>
<item xmlns:dc='ns:1'>
<title>AdvancedHEALTH</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32305</link>
<guid>16f541b005e91cd15bf516c1961ea0b0</guid>
<pubDate>Sat, 16 May 2026 11:52:53 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>AdvancedHEALTH</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>26c07960436de341e303938ce35eb754a11b0776d6ac9bd32dd4a50db9a08c01</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Turner-Supply</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32302</link>
<guid>d3102a0b7413aa55427210bbd83624b4</guid>
<pubDate>Fri, 15 May 2026 22:52:55 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Turner-Supply</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>ddae4889daf3171930c16c89cea107ff8630800926d8e794f8f6fdcf303dab0a</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Zywave</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32304</link>
<guid>87d76d9c72d0b437182d4c27536b43c2</guid>
<pubDate>Fri, 15 May 2026 20:57:53 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Zywave</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fdd92b59deea4b58d7ec263d2c845a54237ace5ec85107a59ea04097bdb73181</i><br /><br />Target victim <b>website</b>: <i>zywave.com</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grafana</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32303</link>
<guid>25cd125f8916019a9d5909d771fdef61</guid>
<pubDate>Fri, 15 May 2026 20:57:26 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>coinbasecartel</b> claims attack for <b>Grafana</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>570635f005259b2fdeab0d6e300bbcc3bf7a8b30f0a4e2b40b0a0f6cc53f260a</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>coinbasecartel</category>
</item>
<item xmlns:dc='ns:1'>
<title>B.Care-Medical-Center</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32295</link>
<guid>e7010b16c0de033b28694aa1c830b330</guid>
<pubDate>Fri, 15 May 2026 19:54:29 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>B.Care-Medical-Center</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>61d44847853aa6764c77144c2bb1e8e6ae919507eee57e57d8ee4be899a3036a</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>NR-Engineering-Co.-Ltd.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32301</link>
<guid>12ac425957335528f185ebbd3f344307</guid>
<pubDate>Fri, 15 May 2026 17:58:06 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>NR-Engineering-Co.-Ltd.</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ddebcaf83a19fdc314e35727dc984fc76c2dc594e8700af378a4b4201742e17</i><br /><br />Target victim <b>website</b>: <i>www.nre.co.th</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Australian-College-of-Business-Intelligence</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32300</link>
<guid>7f57bce28faaaea3f907428563a4437c</guid>
<pubDate>Fri, 15 May 2026 17:57:40 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Australian-College-of-Business-Intelligence</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>b8db61e8feb2f4f25658c9d3e42004175c4af0c8186b527fc2b0b4d3d8e4fe2d</i><br /><br />Target victim <b>website</b>: <i>www.acbi.edu.au</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Generation-Life</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32299</link>
<guid>b4755be9028acf67416ab6d2abf34d46</guid>
<pubDate>Fri, 15 May 2026 17:57:15 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Generation-Life</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c6c06166c0cb061ecc41987f6cd8a6a4727e780b4c3e3903dc88f8002bbb8bf3</i><br /><br />Target victim <b>website</b>: <i>www.genlife.com.au</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Menzies-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32298</link>
<guid>29e48b729552621616d15c0a82f58016</guid>
<pubDate>Fri, 15 May 2026 17:56:49 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Menzies-Group</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>06f7daf3585eba1d0a3afcbbc8ed7471889c1348e2b499b50f6c494bc595ce80</i><br /><br />Target victim <b>website</b>: <i>www.menziesgroup.com.au</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>LeRoy-Surveyors--Engineers</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32297</link>
<guid>c52376a1820e868235b1851b87492a39</guid>
<pubDate>Fri, 15 May 2026 17:51:49 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>LeRoy-Surveyors--Engineers</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>5e299c59a73aa4ecca70e15de029a489419e39557c3be1f2a3b84dbda77d1090</i><br /><br />Target victim <b>website</b>: <i>lseinc.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Raise-the-Bottom</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32296</link>
<guid>936a96a77c3eca882a69ec04c94372b4</guid>
<pubDate>Fri, 15 May 2026 17:50:09 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>cmdorganization</b> claims attack for <b>Raise-the-Bottom</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>fb4486ce5d80f9b98132befc90a7b0334f8770a8b5ac83bdb106e71e6efab212</i><br /><br />Target victim <b>website</b>: <i>www.raisethebottomidaho.com</i>]]></description>
<category>cmdorganization</category>
</item>
<item xmlns:dc='ns:1'>
<title>Tower-View-Primary-School</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32294</link>
<guid>7d0bbf7a89b8df0db46886555ae8cca5</guid>
<pubDate>Fri, 15 May 2026 16:55:09 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>rhysida</b> claims attack for <b>Tower-View-Primary-School</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>c62e399a4f44592c2a512f57122ba0c4cfaf0b3bf29975b985067afd8dfb8d11</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>rhysida</category>
</item>
<item xmlns:dc='ns:1'>
<title>Common-Part-Groupings</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32293</link>
<guid>ae482b6bae6b28e5f1631932d6e5c382</guid>
<pubDate>Fri, 15 May 2026 16:54:49 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Common-Part-Groupings</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>de9ecb31fd31883c0154244949fb6b4c28c9425104a55fab5bbaf4d85e4e08f7</i><br /><br />Target victim <b>website</b>: <i>www.commonpartgroupings.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Foot-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32292</link>
<guid>ee90b45cf1106fef95ee81de63d7a322</guid>
<pubDate>Fri, 15 May 2026 16:54:20 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Foot-Solutions</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>705a6b2a507f719b6a53bfb8e5fb544c86136fac0e00f7308e0ada013c6eeeac</i><br /><br />Target victim <b>website</b>: <i>www.footsolutions.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Advanced-Medical-Consultants</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32291</link>
<guid>37e0eaaff0973a8ab20092edeacf2ff0</guid>
<pubDate>Fri, 15 May 2026 16:51:45 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>dragonforce</b> claims attack for <b>Advanced-Medical-Consultants</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6f83dca9e9c66227a506a33bd949e3744449f995e598e36fcfe852f59b008020</i><br /><br />Target victim <b>website</b>: <i>ouradvancedhealth.com</i>]]></description>
<category>dragonforce</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fox-Valley-Tax-Solutions</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32290</link>
<guid>613594054b1f1c7911d9f9fc9c795477</guid>
<pubDate>Fri, 15 May 2026 15:50:20 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Fox-Valley-Tax-Solutions</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6abe64995db55bd2a4fdd1e74d6006b91e5d4e6dd986f3be1c0d952c7e1c6013</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>wwag.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32289</link>
<guid>b114906b1c37b67e17100bd6401d859c</guid>
<pubDate>Fri, 15 May 2026 14:55:47 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>krybit</b> claims attack for <b>wwag.org</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>a03912ba8c8abe0981d0afa35516209ad3f751963e5c52ecdef5e699c5951fcc</i><br /><br />Target victim <b>website</b>: <i>wwag.org</i>]]></description>
<category>krybit</category>
</item>
<item xmlns:dc='ns:1'>
<title>McCarthy-Inc</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32288</link>
<guid>68f8b8440b1eb96b97995c5efb6856a9</guid>
<pubDate>Fri, 15 May 2026 14:24:10 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>kairos</b> claims attack for <b>McCarthy-Inc</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>27cf66a4f869438e8a03284b3169da9a63bbeedeed5ca1dbad2a4b420cbd915f</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>kairos</category>
</item>
<item xmlns:dc='ns:1'>
<title>defenseisready.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32287</link>
<guid>358680ef4f169bc21f0eec123b85119d</guid>
<pubDate>Fri, 15 May 2026 14:23:54 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>defenseisready.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>2291a191a8e7730c7e7afd0a3733d31a4a1b012ef26550ae918f88cd008c1498</i><br /><br />Target victim <b>website</b>: <i>defenseisready.com</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Moet</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32286</link>
<guid>2a44fc01550de95485464916cfcfdbf1</guid>
<pubDate>Fri, 15 May 2026 12:50:14 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>AuditTeam</b> claims attack for <b>Moet</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6239c3cf761868e2fdae8b713f21696a71964496aad9aa4def400e0687d53421</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>AuditTeam</category>
</item>
<item xmlns:dc='ns:1'>
<title>lafj.org</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32285</link>
<guid>1e4e35498ab5ae64e2c32576328487ba</guid>
<pubDate>Fri, 15 May 2026 12:23:37 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>lafj.org</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>339bff0315c68dcc45226ea8215b05883a721b64078eebfc4ba24dedfc442523</i><br /><br />Target victim <b>website</b>: <i>lafj.org</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>WholeHealth-Chicago</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32284</link>
<guid>285c44427d4b422ed19d9ea061943a12</guid>
<pubDate>Fri, 15 May 2026 11:50:08 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>cmdorganization</b> claims attack for <b>WholeHealth-Chicago</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e11710afefe9c280c73c13e9cfb3ae3ec5a79bfb9bd306ec62730a54690a28fb</i><br /><br />Target victim <b>website</b>: <i>www.wholehealthchicago.com</i>]]></description>
<category>cmdorganization</category>
</item>
<item xmlns:dc='ns:1'>
<title>Instituut-voor-de-Nederlandse</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32283</link>
<guid>a3acb1a52dcaf379f44c93dc844acd62</guid>
<pubDate>Fri, 15 May 2026 10:53:25 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Instituut-voor-de-Nederlandse</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6ba372983ac4b5832330cd3cfae27fb0ba330867b9e07d0343c54e17ccc19ed6</i><br /><br />Target victim <b>website</b>: <i>ivdnt.org</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Grupo-Alvorada</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32282</link>
<guid>49d9a40d7e55c5a283a2910fd7a171af</guid>
<pubDate>Fri, 15 May 2026 10:53:11 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Grupo-Alvorada</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>061d47690cfbfa58706d8c2d406a1c93f79226c63670ec5fd0abdfa940371bcd</i><br /><br />Target victim <b>website</b>: <i>galvorada.com</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ponisch-Abogados</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32281</link>
<guid>3eb5238106ffa4378988e8191304a914</guid>
<pubDate>Fri, 15 May 2026 10:52:58 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Ponisch-Abogados</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9165c561d70da68a4b0a5a7282645aa1560223558dbd86517eb2fd2218904181</i><br /><br />Target victim <b>website</b>: <i>poenisch.com.mx</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>Digiprint</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32280</link>
<guid>c18329a875ee3142771b03cad25cfc79</guid>
<pubDate>Fri, 15 May 2026 10:52:44 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>thegentlemen</b> claims attack for <b>Digiprint</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>8cc031e2fff7e0f63670deedf093cd07de8018bc55a778408d1bad7b20f8653d</i><br /><br />Target victim <b>website</b>: <i>digiprint.pl</i>]]></description>
<category>thegentlemen</category>
</item>
<item xmlns:dc='ns:1'>
<title>United-Quality-Cooperative--www.uqcoop.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32279</link>
<guid>f4667a2fccf527dad06cc706baf81a70</guid>
<pubDate>Fri, 15 May 2026 01:23:02 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>incransom</b> claims attack for <b>United-Quality-Cooperative--www.uqcoop.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>45133ddd027b92640ba3ba5e98cfa79a43c5e3badf27e6401bee48ff2d4d0f8b</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>incransom</category>
</item>
<item xmlns:dc='ns:1'>
<title>Houston-Eye-Associates</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32278</link>
<guid>8e1ba2fadecb9dc939750d1104c8a7f2</guid>
<pubDate>Thu, 14 May 2026 20:20:09 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>cmdorganization</b> claims attack for <b>Houston-Eye-Associates</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>478f8507c2525b64fb69d20c637c4c069c35433c58aaba73e4372443fa50e307</i><br /><br />Target victim <b>website</b>: <i>www.houstoneye.com</i>]]></description>
<category>cmdorganization</category>
</item>
<item xmlns:dc='ns:1'>
<title>PowerCampus</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32277</link>
<guid>199a323c2b7b2b65dae06d56d48b8073</guid>
<pubDate>Thu, 14 May 2026 19:49:40 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>shadowbyt3$</b> claims attack for <b>PowerCampus</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>03cf636966e6bf1f72068107f5daf4d0114ad71fb6058f12f39ebee661f78b43</i><br /><br />Target victim <b>website</b>: <i>powercampus.in</i>]]></description>
<category>shadowbyt3$</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ellucian-PowerCampus-Warning-Contact-Us</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32276</link>
<guid>b12b646e693cbf411f8eaae5204ffdfe</guid>
<pubDate>Thu, 14 May 2026 16:48:12 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>shadowbyt3$</b> claims attack for <b>Ellucian-PowerCampus-Warning-Contact-Us</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>9dbce14775591a70a51c86f72db6e3a5b246f2bb958159a6d231b36ca64f73ff</i><br /><br />Target victim <b>website</b>: <i>ellucian.com</i>]]></description>
<category>shadowbyt3$</category>
</item>
<item xmlns:dc='ns:1'>
<title>Stride-Learning</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32275</link>
<guid>4c9f17e01c03106d9117905e58eb0951</guid>
<pubDate>Thu, 14 May 2026 16:47:59 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>shadowbyt3$</b> claims attack for <b>Stride-Learning</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>6e9322d5185b370361e15aebcd7917d907e1b1ad8e312ae31fa2d5737d144fcd</i><br /><br />Target victim <b>website</b>: <i>stridelearning.com</i>]]></description>
<category>shadowbyt3$</category>
</item>
<item xmlns:dc='ns:1'>
<title>Amplify-Technology</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32274</link>
<guid>d38446cc4f5c0bef25d2270f9db29985</guid>
<pubDate>Thu, 14 May 2026 16:47:47 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>shadowbyt3$</b> claims attack for <b>Amplify-Technology</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1e18ff73bc6c51a204cc796dcff7cc4fe10e0ad3d2d2829b0be1c2867eef47dc</i><br /><br />Target victim <b>website</b>: <i>amplifytechnology.co.uk</i>]]></description>
<category>shadowbyt3$</category>
</item>
<item xmlns:dc='ns:1'>
<title>University-Of-Georgia</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32273</link>
<guid>01065cc12a9d7a950be0386ba0e43157</guid>
<pubDate>Thu, 14 May 2026 16:47:31 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>shadowbyt3$</b> claims attack for <b>University-Of-Georgia</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>3ac104dfad4a4ff110e982f3d27acf978e801e6983d7ebe68f0a57174f040b7b</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shadowbyt3$</category>
</item>
<item xmlns:dc='ns:1'>
<title>Hotelogix</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32272</link>
<guid>dc70dcd4932bb0874226a3eb6d20b38d</guid>
<pubDate>Thu, 14 May 2026 16:47:19 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>shadowbyt3$</b> claims attack for <b>Hotelogix</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e18de9c50a42af11a3c20f4380e2e5bd59fd61573d01fdef9d7cdb8bb1655522</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>shadowbyt3$</category>
</item>
<item xmlns:dc='ns:1'>
<title>Schulte-Lindhorst-GmbH--Co.</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32271</link>
<guid>6508b3f499f5b64f9ca84fbb763fe500</guid>
<pubDate>Thu, 14 May 2026 16:23:05 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Schulte-Lindhorst-GmbH--Co.</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>48a66c309391f29b08a52bebdca62760fa739ae3f1c0888ca9707ab67e38ff5b</i><br /><br />Target victim <b>website</b>: <i>www.schulte-lindhorst.de/impressum.html</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Institute-of-PrivateEnterprise-Development</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32270</link>
<guid>def35ca4715a54f7fecd2fb80419572f</guid>
<pubDate>Thu, 14 May 2026 14:50:21 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>akira</b> claims attack for <b>Institute-of-PrivateEnterprise-Development</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>70effc35f5df6322a4dd921dbc0dd93e296cfe5105780dd9cd2b697d03af80cf</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>akira</category>
</item>
<item xmlns:dc='ns:1'>
<title>Fab-Masters</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32269</link>
<guid>8158fa3e4de806e614f7ff02e7b22fde</guid>
<pubDate>Thu, 14 May 2026 11:54:55 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Fab-Masters</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1b68cdeb79cc276bc0b5271cbe6a635d946679e7e768e8c53820053584614a46</i><br /><br />Target victim <b>website</b>: <i>www.fabmastersinc.com</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>technic.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32268</link>
<guid>e2d83dd47948dde10750f0b7031dcb5e</guid>
<pubDate>Thu, 14 May 2026 11:20:27 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>abyss</b> claims attack for <b>technic.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>788ef2f608f0d7656e9684cb0f76f5a01b372a852e39c02cb17468fcc41a1271</i><br /><br />Target victim <b>website</b>: <i>technic.com</i>]]></description>
<category>abyss</category>
</item>
<item xmlns:dc='ns:1'>
<title>Goodstone-Group</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32267</link>
<guid>4f7146f3ccda08de84a2fc8b92305691</guid>
<pubDate>Thu, 14 May 2026 11:20:10 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>cmdorganization</b> claims attack for <b>Goodstone-Group</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>1531134d4625a3ded8ded42e8b867cb6b0296edebd218585969e389d6b999f55</i><br /><br />Target victim <b>website</b>: <i>www.goodstone.com.au</i>]]></description>
<category>cmdorganization</category>
</item>
<item xmlns:dc='ns:1'>
<title>BAYTECH-AS</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32266</link>
<guid>5d2a47cdbbcc3d3af68f7d4003f796b5</guid>
<pubDate>Thu, 14 May 2026 09:24:46 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>morpheus</b> claims attack for <b>BAYTECH-AS</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>7857f7ef51783d6068071c567df7e03f457528a861a3e2ca75cc280905f5ba75</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>morpheus</category>
</item>
<item xmlns:dc='ns:1'>
<title>Ira--Larry-Goldberg-Coins--Collectibles</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32265</link>
<guid>d4debfe3d5694f7b8a997233f02f3273</guid>
<pubDate>Thu, 14 May 2026 08:20:12 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>cmdorganization</b> claims attack for <b>Ira--Larry-Goldberg-Coins--Collectibles</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>523a3baba6f5f08cb86ae3a58a9699244fdaf67fae0d2ecbbe53b697da07f465</i><br /><br />Target victim <b>website</b>: <i>www.goldbergcoins.com</i>]]></description>
<category>cmdorganization</category>
</item>
<item xmlns:dc='ns:1'>
<title>dsdlawfirm.com</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32264</link>
<guid>4ddd8fd5a3e8489671ff1733c1dd0eae</guid>
<pubDate>Thu, 14 May 2026 02:53:10 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>killsec</b> claims attack for <b>dsdlawfirm.com</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>24623bb402d957a63f52abb8f515b18c6db405c314e23bd7c66345803080885d</i><br /><br />Target victim <b>website</b>: <i>example.com</i>]]></description>
<category>killsec</category>
</item>
<item xmlns:dc='ns:1'>
<title>ttt.vn-UPDATE-FULL-DATA-DUMP</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32263</link>
<guid>56eb2fff9adeac35191fd615fff3efee</guid>
<pubDate>Wed, 13 May 2026 22:25:02 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>ttt.vn-UPDATE-FULL-DATA-DUMP</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>e806d2915e27d15159a8f63f7666755c1302fc30dc733ada3ea6698e1231b31d</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>vspsolutions.com.au-SAMPLE-FREE-20GB</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32262</link>
<guid>a15df7c1b8c9dc6c8a9104c74df2a191</guid>
<pubDate>Wed, 13 May 2026 22:24:50 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>stormous</b> claims attack for <b>vspsolutions.com.au-SAMPLE-FREE-20GB</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>0e8b6c02aa22674e03df417a153e74306ef43212f03a89132de6ea2616f368ae</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>stormous</category>
</item>
<item xmlns:dc='ns:1'>
<title>John-G-Yphantides-A-Professional-Law</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32249</link>
<guid>524e7d08e755cc664226b3d4b8660cd7</guid>
<pubDate>Wed, 13 May 2026 19:52:26 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>John-G-Yphantides-A-Professional-Law</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>dfad1f77feb87d8bc373bac4a93e630b44d1c125c2755445ed62d5ac3d6cc602</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>Brand-X-Hydrovac-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32250</link>
<guid>8e601923e77ae1ddf71ec316a9ddefc7</guid>
<pubDate>Wed, 13 May 2026 19:52:25 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>Brand-X-Hydrovac-Services</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>105782867a0ab1ea6ccbb3601a2abae42f7775746b0e20ebf6bd9489ab34e5eb</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
<item xmlns:dc='ns:1'>
<title>LTJ-Industrial-Services</title>
<link>https://ransomfeed.it/index.php?page=post_details&amp;id_post=32251</link>
<guid>4533c3b629f51a3e981e909506c0b5cc</guid>
<pubDate>Wed, 13 May 2026 19:52:24 CEST</pubDate>
<dc:creator>RansomLook</dc:creator>
<description><![CDATA[Ransomware group called <b>qilin</b> claims attack for <b>LTJ-Industrial-Services</b>. <img referrerpolicy="no-referrer-when-downgrade" src="https://www.ransomfeed.it/matomo/matomo.php?idsite=1&amp;rec=1&amp;action_name=RSS-fast-Public" style="border:0" alt="" /><br />We identify this attack with following <b>hash code</b>: <i>949f6b217196264a47bef2117573223e51750781e3b2dae2de2e31b4c1b76376</i><br /><br />Target victim <b>website</b>: <i>N/D</i>]]></description>
<category>qilin</category>
</item>
</channel>
</rss>
