Ransomware victim disclosure
← All victimsregencycountryclub
Claimed by stormous · listed 19 days ago
Status timeline
- Listed
May 2, 2026
- Data leaked
At a glance
- Group
- stormous
- Status
- Data leaked
- Country
- US
- Sector
- Hospitality and Tourism
- Listed on leak site
- May 2, 2026
About the victim
AI dossier — public-source company profileRegency Country Club is a private membership country club based in the United States operating within the hospitality and tourism sector. The club provides recreational and event facilities to its members and guests, maintaining reservation systems and customer databases. No public website content was available to confirm further operational details.
- Industry
- Private Country Club & Hospitality
Attack summary
Severity: critical — The exfiltrated data includes scanned government-issued identity documents (passports, national IDs) constituting regulated PII, combined with full customer reservation records containing contact details and addresses, internal credentials (RDP files), and email communications — representing a large-scale disclosure of sensitive personal and security-critical data that has already been published.The Stormous ransomware group claims to have exfiltrated data from Regency Country Club, including full customer reservation databases, scanned government-issued identity documents, internal emails, employee and customer email lists, and RDP credential files. The status is listed as data_published, indicating the stolen data has been released or is being offered publicly.
Data the group says was taken
AI dossier — extracted from the leak post- Customer reservation database (names, phones, emails, addresses, booking dates)
- Scanned passport copies
- Scanned national ID documents
- Internal emails (via OWA)
- Employee email list
- Customer email list
- RDP credential files
What the group claims
Full customer reservation databases (names, phones, emails, addresses, booking dates) Scanned ID documents (passports, national IDs) Internal emails via OWA Employee and customer email lists RDP credential files
Source
Indexed 19 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
