Ransomware victim disclosure
← All victimsQuest International
Claimed by Trigona · listed 3 years ago
Status timeline
- Listed
Oct 1, 2023
- Data leaked
At a glance
- Group
- Trigona
- Status
- Data leaked
- Country
- United States
- Sector
- Business Services
- Listed on leak site
- Oct 1, 2023
About the victim
AI dossier — public-source company profileQuest International is a global post-sales service support partner for original equipment manufacturers (OEMs) across multiple industries. The company provides depot repairs, field services, supply-chain logistics, and other professional services to OEM customers. It was founded in 1982 and operates across various sectors on a worldwide basis.
- Industry
- Post-Sales OEM Service & Repair Support
- Founded
- 1982
Attack summary
Severity: high — Data has been confirmed as published by the ransomware group, indicating successful exfiltration of business data from a global services company with OEM customer relationships; potential exposure of customer PII, logistics records, and proprietary business information elevates severity.Trigona ransomware group claims to have attacked Quest International, with the disclosure status indicating data has been published. The leak post does not specify exact data types exfiltrated or whether encryption occurred, but the 'data_published' status implies exfiltration and public release of company data.
Data the group says was taken
AI dossier — extracted from the leak post- Business operational data
- OEM customer records
- Supply-chain logistics information
- Field services data
- Professional services documentation
What the group claims
Quest International is a leading global post-sales service support partner for original equipment manufacturers (OEMs) across various industries, founded in 1982. Company offers services supporting OEM customers through depot repairs, field services, supply-chain logistics, and other professional services.
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
