Cybersecurity and Cyberwarfare coverage

R
Reza Rafati

Securotrop: ransomware and data-leak outfit with 2025 victim roll-up

Tor-hosted leak portal lists 21 victims since July 2025, with multi-hundred-gigabyte claims and staged “published” posts

Securotrop is a ransomware and data-leak outfit first observed in July 2025 that now lists 21 victims on a Tor-hosted portal spanning the United States, Canada, and the United Kingdom; recent entries cite multi-hundred-gigabyte datasets and at least one “published” leak, signaling active coercion through staged disclosures.

Profile

Securotrop operates a Tor leak site where it publishes victim cards that include discovery dates, claimed dataset sizes, and a status field such as “awaiting” or “published.” The brand emerged amid a 2025 wave of extortion-first groups that emphasize public shaming and leak threats over novel encryption techniques. Early social-intel monitors and public trackers began flagging Securotrop in late summer as the portal filled with North American and UK victims.

Victimology and scope

Public roll-ups attribute 21 listed victims to Securotrop with the first discovery on 2025-07-22 and the latest on 2025-10-04. Trackers display an inactivity counter near zero days and an average delay metric estimating time between an alleged incident and public listing, suggesting an active cadence with short lags from compromise to publication. Most named entities appear mid-market, with manufacturing and telecom among the larger claimed datasets.

Top sectors and geographies

Dimension Breakdown Count
Sector Manufacturing 7
Sector Construction 2
Sector Telecommunication 2
Sector Business Services 2
Sector Consumer Services 1
Country United States 14
Country Canada 4
Country United Kingdom 1

Sample recent entries

Late-September to early-October postings include several multi-hundred-gigabyte claims across North American firms, with most entries marked “awaiting” and an earlier Canadian case shown as “published.”

Victim (as listed) Discovery date Claimed size Status
Mill Bay Marine Group 2025-10-04 536 GB AWAITING
Structural Component Systems 2025-10-02 1219 GB AWAITING
Allardyce Bower Consulting 2025-10-01 2743 GB AWAITING
VRE Systems 2025-09-08 174 GB PUBLISHED

Observed infrastructure

The leak portal is exposed via a Tor onion service listed by public trackers. Those listings also show a TOX identifier attributed to Securotrop, indicating a contact channel advertised alongside the portal. These details are observable artifacts tied to the brand’s public presence and do not, by themselves, validate unique infrastructure ownership beyond the leak site identity.

Tactics and posting behavior

Observable behavior centers on data theft, staged posting, and pressure through public listings. Cards present claimed volumes in gigabytes and can change state as coercion escalates. Disclosures emphasize victim naming and dataset size rather than deep technical narratives, leaving limited confirmed visibility into intrusion vectors, tooling, or encryption usage. In broader 2025 context, Securotrop aligns with entrants that lean on branding and leak-site cadence to drive negotiations rather than on distinctive cryptographic methods.

Relationship to ongoing campaigns

Securotrop’s focus on rapid, large-volume claims mirrors the year’s shift toward exfiltration-first extortion. For contrast with availability-focused pressure in the same period, see the South Caucasus overview in the Red Wolf profile. For a separate 2025 incident where consulting artifacts and credentials shaped an extortion narrative at scale, see our coverage of the Red Hat Consulting GitLab breach.

Timeline highlights (2025)

Date Signal
2025-07-22 First Securotrop victim entry appears on public trackers.
2025-08 → 09 Multiple U.S. and Canadian firms added across manufacturing and services.
2025-09-08 VRE Systems listed as “published” with a 174 GB dataset.
2025-10-01 → 10-04 New claims cite 2.7 TB, 1.2 TB, and 536 GB across three firms in CA and US.
Notes: The tracker lists a Tor address for Securotrop’s leak site and a TOX contact ID. These are treated as publicly posted artifacts and do not by themselves validate attribution.

Sources