Ransomware victim disclosure
← All victimsMo***et
Claimed by AuditTeam · listed 6 days ago
Status timeline
- Listed
May 15, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileThe victim is identified only by the partial name 'Mo***et', with no public site content or sector information available. The company's nature, location, and scale cannot be determined from the available evidence.
Attack summary
Severity: high — The group claims exfiltration of over 2 million user records, indicating large-scale PII exposure. Status is 'data_published' and a full archive release is threatened, but the data type and sensitivity are unconfirmed beyond 'user data', preventing a 'critical' rating without further verification.AuditTeam claims to have exfiltrated data affecting 2 million or more users, with a complete data archive threatened for publication upon timer expiration.
Data the group says was taken
AI dossier — extracted from the leak post- User data (2 million+ records)
The leak post
captured from the group's site[[ DATA EXPOSURE LOGS ]](http://6tdqqaxftvradka5d2frzgwixis7fmro7rfh4ettzcx7jfapkebe6jad.onion/) **[ AUDIT TEAM NOTE ]** 2 million+ user data [ ACQUIRED DATA ARTIFACTS RESTRICTED ] [ COMPLETE DATA ARCHIVE WILL BE PUBLISHED UPON TIMER EXPIRATION ]
Sources
Source
Indexed 6 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
