Ransomware victim disclosure
← All victimsStuf Storage
Claimed by fulcrumsec · listed 13 days ago
Status timeline
- Listed
May 8, 2026
- Data leaked
At a glance
- Group
- fulcrumsec
- Status
- Data leaked
- Country
- US
- Sector
- Consumer Services
- Listed on leak site
- May 8, 2026
About the victim
AI dossier — public-source company profileStuf Storage (legally Stuuf Inc., incorporated May 2020 in New York) operates 39 tech-enabled self-storage facilities across nine US cities by converting underutilised commercial space — basements, garages, and retail dead zones — into modern storage units managed remotely via proprietary IoT software (StufOS). The company is venture-backed (~$12.8M raised) and runs its entire operation with approximately three employees. In 2025 it launched SidneyAI, an ElevenLabs-based AI voice agent that handles inbound sales calls and is now marketed as a standalone SaaS product to other storage operators.
- Industry
- Tech-Enabled Self-Storage / PropTech
- Address
- New York, NY, USA (incorporated; facilities in New York, Los Angeles, San Francisco, Glendale, Culver City, Walnut Creek, Washington DC, Seattle, and other cities)
- Employees
- 3
- Founded
- 2020
Attack summary
Severity: critical — Confirmed large-scale exfiltration of regulated PII including names, phone numbers, GPS location history, physical lock codes, and thousands of covertly recorded audio calls capturing sensitive personal disclosures (medical conditions, incarceration history, financial distress, crisis situations) for ~3,800 customers across states with all-party consent recording laws (California, Washington). Additionally, full source code and live API credentials were exfiltrated and the complete archive has bThe group claims to have exfiltrated approximately 287 GB of data across 31 AWS S3 buckets containing 19,553 files, including complete replications of two production PostgreSQL databases, 9,111 customer call recordings, 7,362 AI transcripts, 137,297 GPS access events, 5,118 rental contracts, PII for ~3,800 customers, 2,257 storage unit lock codes, 40 GB of application source code, and six sets of API credentials. A ~221 GB archive has been published via an onion link; lock codes were withheld from the public release.
Data the group says was taken
AI dossier — extracted from the leak post- Customer PII (full names, phone numbers, unit assignments, facility locations, pricing)
- 5,118 rental contracts with digitally signed PDFs
- 9,111 call recordings (MP3 audio, 3.8 GB)
- 7,362 AI-generated call transcripts with sentiment analysis
- 137,297 GPS physical-access unlock events (latitude/longitude coordinates)
- 2,257 storage unit lock codes
- 10,231 follow-up SMS messages with personalised booking links
- 40 GB application source code (22 CodePipeline repositories)
- 6 API tenant credential sets (client IDs, secrets, private keys)
- Two complete production PostgreSQL database replicas (SidneyAI — 14 tables; StufOS — 39 tables)
- Employee email addresses (8 internal staff)
- 12 external demo account records from competing storage companies
Original description
AI-summarised, not from the leak postStuf Storage is a US-based company operating in the self-storage industry. It offers on-demand, flexible storage solutions primarily in urban markets, allowing customers to rent storage units without long-term commitments. The company focuses on converting underutilized urban spaces such as basements and parking structures into storage facilities. Stuf operates across several major US cities and targets city dwellers seeking convenient, accessible storage options.
The leak post
captured from the group's site[DOWNLOAD COMPLETE ARCHIVE (~221 GB — onion link)](http://4e3p3in2bl67hxchuwza7qvnpe7pyeloyztr5fnh257fxkovfhappjyd.onion/stuf-data/) 287 GB across 31 S3 buckets • 19,553 files • 9,111 call recordings • 7,362 AI transcripts • 137,297 GPS events • 5,118 rental contracts • 3,798 customers • 40 GB source code • Lock codes redacted This is what happens when a venture-backed startup automates the management of people’s physical belongings and forgets to protect any of it. 3,800 people who rented storage units in New York, Los Angeles, San Francisco, Washington DC, and Seattle. About 9,111 phone calls that were recorded without their knowledge. About 137,297 GPS coordinates that tracked when and where they accessed their own property. About 2,257 lock codes — the actual combinations to their actual storage units — replicated as CSV exports to S3 buckets alongside their names, phone numbers, and unit locations. And about an AI named Sidney that listened to all of it. Stuf Storage — legally Stuuf Inc., incorporated May 2020 in New York — is the kind of company that wins awards. named it one of the Most Innovative Companies in 2022. put founder Katharine Lau on its Female Founders 100 list. …
Sources
Source
Indexed 13 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
