Ransomware victim disclosure
← All victimsAsseco Central Europe
listed as asseco-ce.com · Claimed by ALP-001 · listed 2 months ago
Status timeline
- Listed
Apr 3, 2026
- Data leaked
At a glance
- Group
- ALP-001
- Status
- Data leaked
- Country
- PL
- Sector
- Technology
- Listed on leak site
- Apr 3, 2026
About the victim
AI dossier — public-source company profileAsseco Central Europe (Asseco CE) is one of the leading providers of technology innovations and modern IT solutions in Central and Eastern Europe, with over 30 years of experience. The company delivers complex software projects for the commercial sector as well as public administration, with specialisations in banking, healthcare, insurance, utilities, and e-government. It operates across Slovakia, Czech Republic, Hungary, Germany, Austria, and Switzerland as part of the broader Asseco Group.
- Industry
- Enterprise Software & IT Solutions
- Address
- Bratislava, Slovakia (headquarters; also operates in Czech Republic, Hungary, Germany, Austria, Switzerland)
Attack summary
Severity: critical — Asseco CE provides IT systems to banks, health insurers, hospitals, and government institutions across multiple countries; exfiltration of 230 GB from such a provider creates high risk of exposure of regulated PII, financial data, and healthcare data belonging to their clients, with 24 GB already publicly released.The ALP-001 group claims to have exfiltrated approximately 230 GB of data from Asseco Central Europe, publishing 24 GB as sample proof available for download on their leak page. No encryption claim is explicitly stated; the disclosure status is confirmed data_published.
Data the group says was taken
AI dossier — extracted from the leak post- Internal business documents
- Software/IT project data
- Potentially client data (banking, healthcare, insurance, public sector)
- Sample files (24 GB published)
What the group claims
Country: Slovakia , Revenue: $4.4 billion Storage: 230GB Description: Asseco Central Europe (Asseco CE) is one of the strongest software houses in Central and Eastern Europe. It is active in Slovakia, the Czech Republic, Hungary, Germany, Austria and Switzerland. ** WE UPLOADED 24GB As Samples ** ** You Can Download Samples From Leak Page ** Deadline: 2026-04-11 21:51:49
Sources
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
