Ransomware victim disclosure
← All victimsHighwealth Construction
listed as Highwealth · Claimed by Vendetta · listed 3 years ago
Status timeline
- Listed
Feb 21, 2023
- Data leaked
At a glance
- Group
- Vendetta
- Status
- Data leaked
- Country
- Taiwan
- Sector
- Real Estate
- Listed on leak site
- Feb 21, 2023
About the victim
AI dossier — public-source company profileHighwealth Construction is a Taiwanese real estate developer and homebuilder headquartered in Kaohsiung with over 30 years of history. The company began operations in Kaohsiung and has since expanded northward across Taiwan, with projects in Tainan, Taichung, Hsinchu, Taipei, and the New Taipei area. It focuses on developing and selling residential properties across multiple major Taiwanese cities.
- Industry
- Residential Real Estate Development & Construction
- Address
- Kaohsiung, Taiwan (headquarters; operations expanded to Tainan, Taichung, Hsinchu, Taipei, and New Taipei)
Attack summary
Severity: high — Data has been confirmed published by the threat actor, indicating successful exfiltration from a real estate developer that likely holds significant PII (buyers, contracts, financial transactions) across multiple Taiwanese cities. The data_published status elevates severity above medium even in the absence of detailed inventory.The Vendetta ransomware group claims to have attacked Highwealth Construction and has published the data (disclosed status: data_published), indicating exfiltration of company data; the specific data types and volume were not detailed in the truncated post.
Data the group says was taken
AI dossier — extracted from the leak post- Internal company documents
- Potentially customer/buyer records
- Potentially financial records
What the group claims
In the best location, build the best house, the best homeMore than 30 years ago, we started our business in Kaohsiung. After laying the foundation, we developed all the way north and expanded to Tainan, Taichung, Hsinchu, Taipei, New...
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
