Group:
Cactus
Discovered by ransomware.live: 2025-02-24
Estimated attack date:
2025-02-16
Country:
Description:
<p>Commercial & Residential Construction.<br><br>“Everel is a leader in the production and supply of electromechanical parts for the most celebrated household electrical appliance manufacturers and for the principal automobile producers.”<br><br>Website: <a href="https://www.regulvar.com/">https://www.regulvar.com/</a><br><br>Revenue : $253.5M<br><br>Address: 3985 Boul Industriel, Laval, Quebec, H7L 4S3, Canada<br><br>Phone Number: +33 147921130<br><br>Download link #1: <a href="https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/REG_NET/PROOF/">https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/REG_NET/PROOF/</a><br><br>Mirror: <a href="https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/REG_NET/PROOF/">https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/REG_NET/PROOF/</a><br><br>DATA DESCRIPTIONS: Personal identifiable information, database backups, corporate confidential documents, agreements, projects, engineering data, drawings, financial documents\payroll, corporate correspondence, etc.</p><p><img src="/uploads/Emailing_passeport_JCBM_1_f874aa9561.png" alt="Emailing passeport JCBM1.png"><img src="/uploads/Formulaire_330_23_signe_passeport_ac612d71ab.png" alt="Formulaire 330-23 signé + passeport.png"><img src="/uploads/Regulvar_inc_Rapport_financier_A_SIGNER_31_01_2024_c2c897a97f.png" alt="Régulvar inc. - Rapport financier À SIGNER 31-01-2024.png"><img src="/uploads/Regulvar_Canada_Inc_Confidentiality_Agreement_338bae0494.png" alt="Regulvar Canada Inc. Confidentiality Agreement.png"><img src="/uploads/9017_054_1001_14_sonde_niveau_chlore_Ref_BPA_d0124fe34b.png" alt="9017-054-1001# 14 sonde niveau chlore Ref.BPA.png"></p>
Infostealer activity detected by HudsonRock
Compromised Employees: 5
Compromised Users: 0
Third Party Employee Credentials: 7
External Attack Surface:
6
DNS Records:
The following DNS records were found for the victim's domain.
- domain.operations@web.com
- regulvar-com.mail.protection.outlook.com.
- v=spf1 ip4:209.91.178.204 include:spf.protection.outlook.com include:sendgrid.net include:zoho.com include:transmail.net include:spf.os.ca -all
Cloud / SaaS Services Detected
Zoho Mail
SendGrid
Leak Screenshot:
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.