Comprehensive database of organizations affected by ransomware attacks. Search, filter, and explore victim data.
Last updated: Feb 4, 2026, 12:00 AM
Total Victims
4073
Last 30 Days
0
Last Attack
Feb 4, 2026
Top Targeted Countries
Top Targeted Industries
Plumbing flow control designs and smart building data.
Payment technology source code and aerospace components.
Telecommunications cable blueprints and undersea infra.
Retail distribution data and automotive logs.
Laboratory equipment software and customer order history.
Client-attorney privilege docs, litigation strategy, NDA drafts.
Crushing and screening equipment automation code.
Fluidics systems and fire suppression equipment designs.
Dental aligner 3D models and implant research.
Electronic health records and diagnostic radiology archives.
Wound care product research and clinical trial results.
Machine vision software source code and client schematics.
Unreleased film masters, script drafts, payroll info.
Satellite orbital data, propulsion system specs, defense contracts.
Avionics software and satellite communication hardware designs.
Lighting control systems and building management IoT.
Scientific instrument blueprints and spectroscopy data.
Radiotherapy software algorithms and patient dosimetry logs.
Logistics network and industrial equipment blueprints.
VIP patient medical records and private wealth billing data.
Surgical workflow software and ventilator schematics.
Hearing aid signal processing algorithms and customer data.
Steam management system designs and industrial client lists.
Dental implant manufacturing designs and client clinic database.
Orthopedic reconstruction templates and sports medicine data.
Aseptic packaging designs and food processing R&D.
Surgery videos, patient HIV status, billing info.
Copper and brass manufacturing specs and distributor logs.
Precision instrumentation software and materials analysis.
Experimental data, drug formulas, grant applications.
Private patient directories and insurance billing audits.
Healthcare administration and financial billing systems compromised.
Industrial robotics source code and CNC controller blueprints.
Packaging design patents and global client contracts.
International medical tourism database and billing records.
Industrial tool designs and mining automation code.
Industrial sealing tech and material science blueprints.
Supercomputing architectures and semiconductor research.