Ransomware victim disclosure
← All victimsPROMOSFERA S.R.l.
Claimed by blacknevas · listed 20 days ago
Status timeline
- Listed
Apr 30, 2026
- Data leaked
At a glance
- Group
- blacknevas
- Status
- Data leaked
- Country
- IT
- Sector
- Business Services
- Listed on leak site
- Apr 30, 2026
About the victim
AI dossier — public-source company profilePromosfera S.R.L. is an Italian agency specializing in international prize promotions, sweepstakes, and contest management, operating across more than 85 countries in Europe, Asia, and the Americas. The company offers a full-service suite including legal compliance for promotions, social media giveaways, contest software, cashback campaigns, and advergames. With approximately 19 years of experience, it serves clients internationally as a turnkey promotions organizer.
- Industry
- Promotional Marketing & Prize Competition Services
- Employees
- 11-50
- Founded
- 2006
Attack summary
Severity: critical — Confirmed exfiltration and publication of PII at scale — hundreds of thousands of individuals' names and emails, tens of thousands with phone numbers, plus passport copies — constitutes regulated personal data exposure affecting a large number of data subjects under GDPR, meeting the critical threshold.The blacknevas group claims to have exfiltrated data from Promosfera S.R.L. and has published it via external file-sharing links, stating the disclosure is complete. The stolen data reportedly includes passports, employee and client documents, databases of promotional participants containing hundreds of thousands of email addresses with full names, tens of thousands of records with email, full name, and phone number, and internal company documentation.
Data the group says was taken
AI dossier — extracted from the leak post- Passport documents
- Employee documents
- Client documents
- Promotional participant databases (hundreds of thousands of emails + full names)
- Promotional participant records with email, full name, and phone number (tens of thousands)
- Internal company documentation
The group's post references roughly 2 proof files.
What the group claims
passports, employee and client documents, databases of promotional participants - hundreds of thousands of emails + full names, tens of thousands of emails + full names + phone numbersinternal company documentationhttps://gofile.io/d/5gNeSzhttps://gofile.io/d/dY7rYEWe ask all our partners, friends and clients to contact us to discuss the acquisition of this data. You know the contacts. For new members, please wait in the Contacts tab.Advertising:We are always ready to cooperate in any form, do you need specific data? We will try to provide it to you as soon as possible, we will receive and download your competitors' data, provide a list of what you are interested in. We are also ready to cooperate with law firms and data leak victims. We will provide all the information you need about the company that was negligent and provided access to data to its clients.
Sources
Source
Indexed 20 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
