Ransomware victim disclosure
← All victimsStrongLink
Claimed by linkc · listed 1 month ago
Status timeline
- Listed
Apr 8, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileStrongLink is a company whose industry, location, and operational details could not be determined from the available leak post or public site content. No clearnet site was accessible and no contextual information was provided in the post.
Attack summary
Severity: medium — Data has been published (not merely listed), indicating confirmed exfiltration has occurred; however, the nature, sensitivity, and scale of the data are entirely unknown, precluding a higher severity rating.The group 'linkc' has published data claimed to be from StrongLink, with the disclosure status marked as 'data_published'. A sample download link hosted on IPFS was provided as proof of the exfiltration.
Data the group says was taken
AI dossier — extracted from the leak post- Sample files (IPFS-hosted)
The group's post references roughly 1 proof file.
What the group claims
DOWNLOAD SAMPLE: https://amber-wooden-prawn-35.mypinata.cloud/ipfs/bafybeian2lxaye6gwvi2kztzfpyr2lokzfngai3d4zjmtgqhhv74ixsvi4
The leak post
captured from the group's siteNetwork Technology Services of New Jersey Feb 27, 2026, 4:12:25 PM Whole datacenter is encrypted. Waiting for you in chat. Feb 3, 2026, 7:08:35 AM ; at 4/30/26, 12:00 AM Jan 30, 2026, 5:15:34 PM 700mb of blueprints including Amazon LEO (satellite) Project Kuiper scheme, Airbus, Boeing engines and metal alloy technologies. Enjoy. https://amber-wooden-prawn-35.mypinata.cloud/ipfs/bafybeic5m7e3dvlunitnv6vxzbcvqqgm4pybgc3ykn3jo62jipshf6bjve ; at 4/30/26, 12:00 AM
Sources
Source
Indexed 1 month agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
