Ransomware victim disclosure
← All victimsrinaldi
Claimed by stormous · listed 19 days ago
Status timeline
- Listed
May 2, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileRinaldi appears to be a company operating a network of registered distributors and sellers, with at least 1,000 such partners. No public website content was available to confirm its precise industry, headquarters, or scale. The nature of the leaked data suggests it functions as a wholesale or distribution-oriented business.
- Industry
- Distribution & Sales Network
Attack summary
Severity: high — Data has been published and includes PII (full names, phone numbers, email addresses) for customers and employees at meaningful scale, plus admin credentials which pose secondary breach risk. The combination of credential exposure and customer/employee PII warrants a high severity rating.Stormous claims to have exfiltrated data belonging to Rinaldi, including information on approximately 1,000 registered distributors and sellers, comprising employee and customer records, admin login credentials, email addresses, phone numbers, and full names. The disclosure status is listed as data_published, indicating the data has been released.
Data the group says was taken
AI dossier — extracted from the leak post- Distributor and seller records (approx. 1,000)
- Employee information
- Customer information
- Admin login passwords
- Email addresses
- Phone numbers
- Full names
What the group claims
Data of 1,000 registered distributors and sellers employee and customer information - admin login passwords - email addresses, phone numbers, full names - and more...
Source
Indexed 19 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
