Comprehensive database of organizations affected by ransomware attacks. Search, filter, and explore victim data.
Last updated: Feb 4, 2026, 12:00 AM
Total Victims
4073
Last 30 Days
0
Last Attack
Feb 4, 2026
Top Targeted Countries
Top Targeted Industries
Healthcare administration and financial billing systems compromised.
Land deeds, investor reports, panel efficiency logs.
Chemical protection glove formulas and supply chain contracts.
Surgical workflow software and ventilator schematics.
LEC Network Under Control. We hold the blueprints of the national power grid and customer billing databases. Silence from the board will lead to data exposure.
CATIA source code fragments and aerospace simulation data.
International medical tourism database and billing records.
Chemical catalyst formulas and factory automation code.
Compressor technology and industrial power tool schematics.
Industrial robotics source code and CNC controller blueprints.
Infrastructure blueprints, SCADA network maps, chemical formulas.
Industrial compressor designs and customer service portal.
Electronic Health Records (EHR) and diagnostic logs.
Hearing implant firmware and recipient audiology records.
Student records, financial aid applications, research data.
Supercomputing architectures and semiconductor research.
Defense electronics schematics and underwater drone data.
Passport scans, visa applications, itinerary logs.
Guest passports, room service logs, VIP requests.
Laboratory equipment software and customer order history.
Student medical records, staff disciplinary logs.
Industrial tool designs and mining automation code.
Industrial sealing tech and material science blueprints.
Experimental data, drug formulas, grant applications.
Supplier invoices, quality control reports, logistics maps.
Cardiovascular product designs and blood management data.
Shipping manifests, GPS tracking logs, client contracts.
GMO seed research, pesticide usage logs, land surveys.
Scientific instrument blueprints and spectroscopy data.
NIC Liberia infrastructure compromised. Over 15 TB of confidential investment agreements, investor passports, and financial projections exfiltrated.
Radiation oncology software and patient treatment plans.
Premium patient records and hospital billing.
Packaging design patents and global client contracts.
Hematology analyzer data and global service logs.