Ransomware victim disclosure
← All victimsFimmick
listed as Fimmick CRM Hong Kong (www.fimmick.com) · Claimed by Revil · listed 5 years ago
Status timeline
- Listed
Sep 30, 2021
- Data leaked
At a glance
- Group
- Revil
- Status
- Data leaked
- Country
- Hong Kong
- Sector
- Technology
- Listed on leak site
- Sep 30, 2021
About the victim
AI dossier — public-source company profileFimmick is an award-winning Digital MarTech Group headquartered in Hong Kong, with additional offices in Taiwan, Singapore, Mainland China, the UK, and UAE. The company provides AI-powered business transformation, CRM strategy and implementation, digital and performance marketing, influencer/KOL marketing, and MarTech/AdTech solutions. It serves clients across multiple markets leveraging first-party data integration, AI agents, and creative automation tools.
- Industry
- Digital Marketing & MarTech Services
- Address
- 1/F., Hung To Centre, 94-96 How Ming Street, Kwun Tong, Kowloon, Hong Kong
Attack summary
Severity: high — REvil is a well-known ransomware group with a history of exfiltrating data before publishing it; the disclosed status is 'data_published', indicating actual data release. Fimmick handles CRM and first-party customer data for business clients, meaning the breach likely involves sensitive business and possibly end-customer PII at scale, elevating severity to high.REvil claimed an attack against Fimmick CRM Hong Kong, with the disclosure status recorded as data_published, indicating exfiltration and potential publication of company data. No specific ransom demand or data volume was stated in the available post.
Data the group says was taken
AI dossier — extracted from the leak post- CRM data
- Customer relationship management records
- Business client data
- Marketing and campaign data
- Potentially first-party customer data
Sources
- Victim sitefimmick.com
Source
Indexed 5 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
