Rex Mundi hackers made data public of companies which refused to pay  

The Rex Mundi hackers which are known for their blackmailing techniques have launched a new website which holds an archive of their latest hacks on companies which declined to pay the ransom demand.

rex mundi leak page

Once you visit the website, you will see that the following companies have been breached by the Rex Mundi hackers:

  • Accord
  • Alfahosting
  • Buyway
  • Domino’s
  • Drake International
  • Easypay
  • Exaris
  • Mensura
  • Numericable
  • Tobasco
  • Websolutions
  • Extra-Interim
  • Z-Staffing

The companies which have been hacked are Belgium or Dutch.

The Rex Mundi hackers claimed that their website has been hosted for the following reasons:

On this page, you will find leaks belonging to most of the websites that we hacked. Please note that those are leaks belonging only to companies that declined to pay us. As per our agreement with the companies that did pay us, we will never release those leaks.

The website has been crafted by the Rex Mundi hackers and it is currently hosted on the following url which can be accessed via the TOR browser or the TOR2WEB service:



tor 2 web rex mundi(unsecure and not anonymous)

rex mundi leak

The Rex Mundi hacking team is currently also allowing new people to join the hacking team. The Rex Mundi hackers left the following message on their website which clearly invites people to join the Rex Mundi hacking team:

If you wish to join our team, feel free to contact us at [email protected]

join rex mundi request

Rex Mundi has also left an option available for people that want to grant Bitcoins to the Rex Mundi hackers.

Donations rex mundi hackers


This is what the hackers wrote about themselves on the Rex Mundi .onion site:

Rex Mundi is a collective of hackers. We hack for fun, for the thrills and, most importantly, for profit.

The Rex Mundi hackers have been active for a couple of years and they have been able to stay out of the hands of any government agencies. The Rex Mundi hackers are currently active on the following Twitter account.