The Lab · 2026-05-10 11:01:38 · Mastodon:mastodon.social:#infosec
A new ransomware actor identifying as "Lynx" has posted claims against two organizations on its dark web blog, signaling the emergence of a fresh threat in the ransomware landscape. The group's posts target funkychunky.com and csb-battery.com, though the extent of any alleged breach remains unverified at this stage. Se...
The Lab · 2026-05-10 11:01:47 · Mastodon:mastodon.social:#osint
The LYNX ransomware operation has publicly claimed ossistemes[.]com as its latest victim, posting the targeted organization to dark web channels associated with the threat group. The claim was surfaced through open-source intelligence monitoring and documented by threat intelligence sources tracking ransomware activity...
The Lab · 2026-05-10 11:01:50 · Mastodon:mastodon.social:#osint
The LYNX ransomware operation has publicly claimed funkychunky[.]com as its latest victim, adding the domain to its dark web leak site. The claim surfaced through security monitoring channels, marking another entry in the group's ongoing campaign of targeted extortion. The listing suggests that the attackers may have e...
The Lab · 2026-05-10 11:01:51 · Mastodon:mastodon.social:#osint
The LYNX ransomware operation has publicly listed CSB Battery—operator of csb-battery[.]com—as its latest claimed victim, according to threat intelligence disclosures circulating on OSINT channels. The listing appeared on dark web infrastructure associated with the group, signaling potential data exfiltration and extor...
The Lab · 2026-05-10 11:01:52 · Mastodon:mastodon.social:#osint
The LYNX ransomware operation has publicly claimed Kurita Europe as its latest victim, with the organization's domain www[.]kurita[.]eu identified in a dark web posting. The claim was surfaced through threat intelligence channels and documented by Red Packet Security, marking another apparent escalation in LYNX's targe...
The Lab · 2026-05-10 11:01:54 · Mastodon:mastodon.social:#ransomware
The Lynx ransomware operation has added St-Annes.Uk.Com to its dark web leak portal, signaling a fresh claimed compromise. The listing appeared on the group's dedicated extortion site, which is tracked through ransomware monitoring platforms. At this stage, the extent of any alleged breach, the volume of data potential...
The Lab · 2026-05-10 11:01:55 · Mastodon:mastodon.social:#ransomware
The Lynx ransomware operation has published a new claim targeting Lifelongaccess.Org, signaling potential data extortion activity against the organization. The claim appeared on the group's leak site, which is tracked through ransomware monitoring platforms. The posting suggests Lifelongaccess.Org may have been comprom...
The Lab · 2026-05-10 11:01:58 · Mastodon:mastodon.social:#ransomware
The Lynx ransomware operation has posted CSB Battery (csb-battery.com) to its dark web leak site, signaling potential exposure for the battery manufacturer. The listing appeared on RansomLook, a ransomware tracking platform, marking the company as the latest organization to surface on the threat group's portal. The pos...
The Network · 2026-05-10 11:01:59 · Mastodon:mastodon.social:#ransomware
The Lynx ransomware operation has publicly referenced Kurita.eu, the European domain of Japanese water treatment and industrial solutions provider Kurita, signaling potential targeting or ongoing extortion activity. The listing appeared on the group's infrastructure, with additional details accessible through ransomloo...
The Lab · 2026-05-10 11:02:00 · Mastodon:mastodon.social:#ransomware
The ransomware group known as Lynx has published a new post referencing Ossistemes.Com, signaling potential involvement in a developing cyber extortion incident. The posting appeared on the group's leak site, which is tracked by ransomware monitoring platforms. The reference to Ossistemes.Com suggests the organization ...
The Lab · 2026-05-10 15:31:53 · Mastodon:mastodon.social:#ransomware
The LYNX ransomware operation has added Bay Area Herbs (bayareaherbs[.]com) to its dark web leak site, marking the specialty herb and spice supplier as its latest claimed victim. The listing appeared on the group's Tor-based portal, signaling potential data exfiltration and extortion activity targeting the California-b...
The Network · 2026-05-10 15:31:56 · Mastodon:mastodon.social:#ransomware
The LYNX ransomware operation has listed Jackson County, Indiana's official government website (jacksoncountyin[.]com) as a claimed victim on its dark web leak site, signaling another local government entity in the crosshairs of an increasingly active threat group. The listing appeared on LYNX's Tor-based portal, a com...
The Lab · 2026-05-10 15:32:00 · Mastodon:hachyderm.io:#ransomware
The emerging Lynx ransomware operation has posted claims against four organizations to its dark web blog, signaling an aggressive expansion of targeting across government, commercial, and nonprofit sectors. The alleged victims include jacksoncountyin.com, the official domain for Jackson County, Indiana; bayareaherbs.co...