Ransomware victim disclosure
← All victimsH****l
Claimed by payoutsking · listed 21 days ago
Status timeline
- Listed
Apr 30, 2026
- Data leaked
At a glance
- Group
- payoutsking
- Status
- Data leaked
- Country
- US
- Sector
- Hospitality and Tourism
- Listed on leak site
- Apr 30, 2026
About the victim
AI dossier — public-source company profileThe victim is a US-based hospitality or tourism entity whose name begins with 'H' and ends with 'l', operating under a domain beginning with 't'. Insufficient public information is available to characterise the company further. The sector classification suggests hotel, resort, travel, or related services.
- Industry
- Hospitality and Tourism
Attack summary
Severity: medium — Status is 'data_published', indicating data has been released rather than a mere listing, which elevates severity above low. However, no leak post content, data size, or data inventory is available to confirm regulated or sensitive data exposure at scale, preventing a higher rating.The group 'payoutsking' claims a data publication disclosure against this US hospitality entity. No leak post content was captured, so the specific nature of the attack (encryption, exfiltration, or both) and the scope of data at stake cannot be confirmed.
Sources
- Victim sitet****.com
Source
Indexed 21 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
