[APT73] – Ransomware Victim: www[.]legilog[.]fr
quality 9/10 · excellent
0 net
Entities
[APT73] - Ransomware Victim: www[.]legilog[.]fr - RedPacket Security Skip to content Home Data Breach [APT73] – Ransomware Victim: www[.]legilog[.]fr Ransomware Group: APT73 VICTIM NAME: www[.]legilog[.]fr NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the APT73 Onion Dark Web Tor Blog page. AI Generated Summary of the Ransomware Leak Page The ransomware leak page for the organization related to the domain legilog.fr provides insight into a significant data breach involving management software utilized across various sectors such as culture, business, and religion. The page reports that approximately 10 GB of data was compromised, which includes backup files, CRM systems, and personal data. As a result, the organization faces potential risks associated with the exposure of sensitive information. The information on the website reveals that the incident was discovered on October 29, 2024, with the leak information published on the same day. The reported data includes information on various employees and third parties, with a total of 13 users affected, indicative of a potential risk to the organization’s operations and collaboration with external entities. The group behind the attack has been named apt73 . The leak outlines critical items available for download and mentions the presence of internal document screenshots, underscoring the severity of the breach and the types of data involved. The country of operation is France, emphasizing the geographical implications of the cybersecurity incident within the European landscape. A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality. If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below Buy Me A Coffee Patreon To keep up to date follow us on the below channels. Telegram Discord Reddit LinkedIn Mastodon Tags: apt73 , Dark Web , data breach , OSINT , ransomware , threatintel , tor Search Search for: SUPPORT THE WEBSITE OFFICIAL MERCH STORE Recommended eBook Tags #threatintel #security #osint 8base akira bug bounty Bypass Security cisa clop CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity Dark Web dark web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt Vendor Advisory vulnerability You may have missed Vulnerabilities CVE Alert: CVE-2026-40032 – tclahr – UAC April 9, 2026 Vulnerabilities CVE Alert: CVE-2026-40036 – obsidianforensics – unfurl April 9, 2026 Cobalt Strike Cobalt Strike Beacon Detected – 49[.]234[.]199[.]152:80 April 9, 2026 Cobalt Strike Cobalt Strike Beacon Detected – 120[.]48[.]25[.]153:80 April 9, 2026 Cobalt Strike Cobalt Strike Beacon Detected – 8[.]141[.]93[.]66:8081 April 9, 2026 We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. Ok