Ransomware victim disclosure
← All victimsil Centro
Claimed by Knight · listed 3 years ago
Status timeline
- Listed
Oct 31, 2023
- Data leaked
At a glance
- Group
- Knight
- Status
- Data leaked
- Country
- Italy
- Sector
- Media & Entertainment
- Listed on leak site
- Oct 31, 2023
About the victim
AI dossier — public-source company profileIl Centro SpA is an Italian regional daily newspaper serving the Abruzzo region, founded on 3 July 1986 and headquartered in Pescara, Italy. It covers local news across the provinces of Chieti, L'Aquila, Pescara, and Teramo, and offers both print and digital editions. The publication is part of GEDI Gruppo Editoriale, following a merger with Gruppo Editoriale L'Espresso, which had acquired it in 1993.
- Industry
- Print & Digital News Media
- Address
- Largo Filomena Delli Castelli 10, 65128 Pescara (PE), Italy
- Founded
- 1986
Attack summary
Severity: high — The disclosure status is 'data_published', meaning the threat actor has already released stolen data. As a regional media company, this likely involves internal business records, employee PII, and potentially subscriber data, constituting confirmed exfiltration of significant business and personal data.The Knight ransomware group claims to have attacked il Centro and the status is listed as data_published, indicating exfiltration and/or encryption with data subsequently released. No ransom amount or data size was specified in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Newspaper editorial content
- Internal business documents
- Employee records
- Subscriber/reader data
- Advertising and commercial records
What the group claims
https://www.ilcentro.it/Il Centro è il quotidiano d'Abruzzo. Il suo primo numero uscì il 3 luglio 1986.The newspaper was part of Gruppo Editoriale L'Espresso. It was acquired in 1993. After a merger, the parent company is now known as GEDI Gruppo Editoriale.
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
