Ransomware victim disclosure
← All victimsPARS AR-GE
Claimed by nightspire · listed 2 months ago
Status timeline
- Listed
Apr 3, 2026
- Data leaked
At a glance
- Group
- nightspire
- Status
- Data leaked
- Country
- TR
- Sector
- Not Found
- Listed on leak site
- Apr 3, 2026
About the victim
AI dossier — public-source company profilePARS AR-GE is a Turkish R&D and electronics manufacturing company founded in 2008 by Prof. Dr. Sarp Ertürk at Kocaeli University Technopark. The company develops and produces domestic automotive electronics including digital tachographs (Pars DT-101), smart taximeters, speed sensors, and data download devices, with products widely deployed in the field. It has also historically provided R&D services to defence industry and industrial organisations in Turkey.
- Industry
- Automotive Electronics & R&D (Digital Tachographs, Taximeters, IoT Devices)
- Address
- Kocaeli Üniversitesi Teknopark, Kocaeli, Turkey
- Founded
- 2008
Attack summary
Severity: critical — Confirmed exfiltration and publication of data includes source code for embedded/automotive systems (with defence-sector history), PII-bearing employee and customer documents, and financial records — constituting regulated personal data (KVKK) at scale alongside sensitive IP with national security relevance given the company's defence industry ties.The Nightspire ransomware group claims to have exfiltrated data from PARS AR-GE, with the disclosed status indicating data has been published. The stolen data allegedly includes project source code, finance records, technical data, customer documents, and employee information.
Data the group says was taken
AI dossier — extracted from the leak post- Project source code
- Finance records
- Technical data
- Customer documents
- Employee information
What the group claims
- Project Source Code- Finance Records- Technical Data- Customer Documents- Employee Info
Sources
- Victim sitewww.parsarge.com
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
