Comprehensive database of organizations affected by ransomware attacks. Search, filter, and explore victim data.
Last updated: Feb 4, 2026, 12:00 AM
Total Victims
3713
Last 30 Days
50
Last Attack
Feb 4, 2026
Top Targeted Countries
Top Targeted Industries
Pneumatic equipment designs and factory robotics data.
Genomic research and electronic health records.
Lighting control systems and building management IoT.
Avionics software and satellite communication hardware designs.
Cancer research database and clinical trial participant PHI.
Proprietary coating technology and aerospace component designs.
Trauma center data and hospital administration files.
Dialysis machine firmware and kidney research data.
Diagnostic software tools and franchisee financial data.
Cardiac device firmware and clinical study participants.
CAD designs for EV engines, battery chemistry, assembly line logs.
Satellite telemetry, defense contracts, engineer profiles.
Surgery videos, patient HIV status, billing info.
Unreleased film masters, script drafts, payroll info.
Pathology results and imaging lab records.
Health screening data and specialist consultant directories.
Claims history, policy details, social security numbers.
Radiation oncology software and patient treatment plans.
Industrial compressor designs and customer service portal.
Patient records, insurance claims, doctor schedules.
Land deeds, investor reports, panel efficiency logs.
CATIA source code fragments and aerospace simulation data.
Life science research products and clinical diagnostic data.
Chemical catalyst formulas and factory automation code.
Logistics tracking software and printer firmware.
Passport scans, visa applications, itinerary logs.
Oil rig geological surveys, exploration maps, bidding wars.
Safety sensor technology and environmental monitoring data.
Heart valve replacement designs and clinical registries.
Precision instrumentation software and materials analysis.
NIC Liberia infrastructure compromised. Over 15 TB of confidential investment agreements, investor passports, and financial projections exfiltrated.
Student medical records, staff disciplinary logs.
LEC Network Under Control. We hold the blueprints of the national power grid and customer billing databases. Silence from the board will lead to data exposure.
Hematology analyzer data and global service logs.
Geospatial sensor data and autonomous driving simulations.