Ransomware victim disclosure
← All victimsUpstox
listed as Upstox.com Huge Data · Claimed by Darkleakmarket · listed 5 years ago
Status timeline
- Listed
Sep 9, 2021
- Data leaked
At a glance
- Group
- Darkleakmarket
- Status
- Data leaked
- Country
- India
- Sector
- Financial Services
- Listed on leak site
- Sep 9, 2021
About the victim
AI dossier — public-source company profileUpstox is an Indian online discount brokerage and investment platform headquartered in Mumbai, Maharashtra. The platform serves over 13 million (1.3 crore) registered users, offering trading and investing in equities, futures and options, commodities, currencies, mutual funds, IPOs, and insurance products. It is backed by prominent investors and operates one of India's leading retail trading apps.
- Industry
- Online Stock Brokerage & Investment Platform
- Address
- 30th Floor, Sunshine Tower, Senapati Bapat Marg, Dadar (W), Mumbai, Maharashtra 400013, India
- Employees
- 501-1000
- Founded
- 2009
Attack summary
Severity: critical — Upstox is a regulated financial services platform with over 13 million retail investors; a confirmed data publication by a threat actor implies large-scale exfiltration of regulated financial PII, KYC records, and investment data — meeting the critical threshold for regulated/sensitive data at scale.The group Darkleakmarket claims to have obtained and published a large dataset from Upstox, described as 'Huge Data', with no ransom demand stated. No specific details of the exfiltration method or precise data categories were captured in the leak post.
Data the group says was taken
AI dossier — extracted from the leak post- Customer personal data (PII)
- Financial account information
- Trading/investment records
- KYC documentation (likely)
Sources
- Victim siteupstox.com
Source
Indexed 5 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
