Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business
Group: Cactus
Discovered by ransomware.live: 2025-03-21
Estimated attack date: 2024-12-16
Description:
<p><mark class="marker-yellow"><strong>11.02.2025 UPDATE! 100% Disclosed 21GB >> Download link #2</strong></mark></p><p>Food & Beverage.<br><br>“FPL Food, LLC is the largest privately held vertically integrated beef processor in the Southeastern United States and is one of the largest privately held processors of fresh beef products and value added meat selections in the United States. The Company has four facilities, and serves several brands reaching retail and foodservice customers. The Company delivers beef products locally and exports worldwide.”<br><br>Website: <a href="https://fplfood.com/">https://fplfood.com/</a><br><br>Revenue : $675M<br><br>Address: 1301 New Savannah Rd, Augusta, Georgia, 30901, United States<br><br>Phone Number: (706) 722-2694<br><br><mark class="marker-yellow"><strong>Download link #1:</strong></mark> <a href="https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/FPLFOOD/PROOF/">https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/FPLFOOD/PROOF/</a><br><br><mark class="marker-yellow"><strong>Mirror:</strong></mark> <a href="https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/FPLFOOD/PROOF/">https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/FPLFOOD/PROOF/</a></p><p><mark class="marker-yellow"><strong>Download link #2:</strong></mark> <a href="https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/FPLFOOD/full/">https://6wuivqgrv2g7brcwhjw5co3vligiqowpumzkcyebku7i2busrvlxnzid.onion/FPLFOOD/full/</a></p><p><mark class="marker-yellow"><strong>Mirror:</strong></mark> <a href="https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/FPLFOOD/full/">https://cactus5dqnqkppa5ayckiyk6dttpqwczdqphv5mxh4dkk5ct544q5aad.onion/FPLFOOD/full/</a><br><br><mark class="marker-yellow"><strong>DATA DESCRIPTIONS:</strong></mark> Personal Identifiable Information, corporate data: invoices, shipping scans, employee personal docs, QA data, corporate correspondence, etc.</p><p><img src="/uploads/Liquetta_Jackson_73f131833f.png" alt="Liquetta Jackson.png"><img src="/uploads/sep_notice_9aaf9d0da4.png" alt="sep notice.png"><img src="/uploads/Peter_Thornton_54f2112004.png" alt="Peter Thornton.png"><img src="/uploads/Rafael_Mayedp_d4e6350ee5.png" alt="Rafael Mayedp.png"><img src="/uploads/0176722_product_373400_121e084ee2.png" alt="0176722 - product 373400.png"></p>
DNS Records:
The following DNS records were found for the victim's domain.
Leak Screenshot:
Legal Disclaimer: Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession, hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data. This platform indexes only publicly visible information posted by ransomware operators and open web sources without accessing or obtaining the underlying stolen content. The service is provided to support public awareness, legitimate research, and cyber-resilience. No stolen personal or confidential data is collected or distributed via this site.