Ransomware victim disclosure
← All victimsDel Rey Serviços
listed as Del Rey · Claimed by vect · listed 3 months ago
Status timeline
- Listed
Feb 25, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileDel Rey Serviços is a Brazilian facilities management company based in Belo Horizonte, Minas Gerais, with over 30 years of operation. The company provides services including condominium administration and financial management, cleaning and conservation, 24-hour concierge/security, and outsourced labour. Its clientele primarily consists of residential and commercial condominium clients.
- Industry
- Facilities Management & Condominium Services
- Address
- Rua Matos da Silveira, 545 - Ipiranga, Belo Horizonte - MG, Brazil
Attack summary
Severity: high — Data has been published (disclosed status: data_published) and includes legal case files, recruitment/HR records, and government-related documents, representing confirmed exfiltration of sensitive business and potentially personal data at meaningful scale.The group 'vect' claims to have exfiltrated data from Del Rey Serviços, with the status listed as 'Negotiating' and data already published. Exposed data reportedly includes legal and individual case process files, service orders, sewage and maintenance documentation, recruitment records, and government-related documents.
Data the group says was taken
AI dossier — extracted from the leak post- Legal and individual case process files
- Service orders
- External work orders
- Sewage and maintenance service documentation
- Recruitment records
- Job vacancy registrations
- Government-related documents
What the group claims
Status: STATUS: NEGOTIATING | Sector: IT | Legal and individual case process files Service orders and external work orders Sewage and maintenance service documentation Recruitment records and job vacancy registrations Gover... | Deadline: 18d 19h
Sources
- Victim sitedelreyservicos.com.br
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
