Ransomware News

The Infamous Ransomware RansomHouse Group Hits: J and N Stone in a recent cyber attack, raising concerns about cybersecurity vulnerabilities. To stay ahead of emerging threats, fortify your online security with the HookPhish Dark Web Monitoring platform. Explore HookPhish Dark Web Monitoring.

 

ransomhouse 1
RansomHouse Logo

Victim Name J & N Stone
Victim Website
(if available)
www[.]jnstone[.]com
Description J & N Stone, Inc. entered the manufactured stone and artificial stone industry in 1973 and has been manufacturing stone and artificial stone products ever since. Headquartered out of Indiana.
Scraped Date 2024-06-04T07:03:05.257Z
Encrypted Date 03/04/2024
Company Revenue $36.6 Million
Employee Count 49
Amount of Files about 300Gb
Disclosure Status EVIDENCE
Disclosure Date DEPENDS ON YOU
Evidence Pack Downloadable YES
Full Data Dump Downloadable NO
Additional Information N/A
Number of Dark Web Post Views (at the time of scraping) 8928

The use of any indicators of compromise (IOCs) or information obtained through cybersecurity research for any purpose other than cybersecurity is not condoned by HookPhish. Any links or references to anything potentially sensitive are being shared for cybersecurity purposes only and are not intended to promote or facilitate any illegal activities. Always consider the potential legal and ethical implications of your actions utilising this information.

 

 

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below


 To keep up to date follow us on the below channels.

RansomHouse Ransomware Group

The ‘RansomHouse’ group is a data-extortion cybercrime operation that emerged in December 2021. Unlike traditional ransomware groups, RansomHouse claims not to use ransomware and instead focuses on breaching networks through their own tools. The group employs a double-extortion model, exfiltrating data and threatening to publish it if ransom demands are not met. RansomHouse has been associated with high-profile attacks, with victims listed on its data leak site, and has targeted various organizations, including a German airline support service provider and Canada’s Saskatchewan Liquor and Gaming Authority (SLGA).

Citations:

Disclaimer: HookPhish does not engage in the exfiltration, downloading, taking, hosting, viewing, reposting, or disclosure of any files or stolen information. Any legal concerns regarding the content should be directed at the attackers, not HookPhish. This blog is dedicated to posting editorial news, alerting readers about companies falling victim to ransomware attacks. HookPhish has no affiliation with ransomware threat actors or groups, and it does not host infringing content. The information on this page is automatically generated and redacted, sourced directly from the Onion Dark Web Tor Blogs pages.

Leave a comment

Your email address will not be published. Required fields are marked *