Ransomware victim disclosure
← All victimsPublic Employees Credit Union
Claimed by Avoslocker · listed 3 years ago
Status timeline
- Listed
Dec 26, 2022
- Data leaked
At a glance
- Group
- Avoslocker
- Status
- Data leaked
- Country
- United States
- Sector
- Finance
- Listed on leak site
- Dec 26, 2022
About the victim
AI dossier — public-source company profilePublic Employees Credit Union is a U.S.-based credit union serving public sector employees. Credit unions of this type provide financial services including deposit accounts, loans, and credit products to their membership base. The organization claims approximately 29,000 members.
- Industry
- Credit Unions & Consumer Finance
Attack summary
Severity: critical — Confirmed exfiltration and publication of regulated PII at scale (29,000 members) including SSNs, credit card data, IRS documents, and loan applications — constituting sensitive financial and tax records subject to regulatory obligations (GLBA, etc.).AvosLocker claims to have exfiltrated confidential files belonging to all 29,000 members, including highly sensitive personal and financial data; the group has published a sample as proof and the disclosure status is listed as data_published.
Data the group says was taken
AI dossier — extracted from the leak post- Full member names
- Member addresses
- Social Security Numbers (SSN)
- Telephone numbers
- Email addresses
- Credit card information
- Loan applications
- IRS documents
What the group claims
We have confidential files belonging to all 29000 members including Name, Address, SSN, Telephone, Email, Credit Cards, Loan Applications, IRS Documents. Include small sample.
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
