Ransomware victim disclosure
← All victimsCeleris Networks
Claimed by sinobi · listed 15 days ago
Status timeline
- Listed
May 5, 2026
- Data leaked
At a glance
- Group
- sinobi
- Status
- Data leaked
- Country
- United States
- Sector
- Technology
- Listed on leak site
- May 5, 2026
About the victim
AI dossier — public-source company profileCeleris Networks is a business IT support provider based in Knoxville, Tennessee, specializing in managed IT services, cybersecurity solutions, and cloud managed services. The firm serves clients across industries including accounting, distribution, legal services, nonprofits, and professional services. It focuses on personalized, dedicated technology support for local businesses.
- Industry
- Managed IT Services & Cybersecurity
- Address
- Knoxville, Tennessee, United States
Attack summary
Severity: high — Data has been published (data_published status), meaning exfiltration is confirmed. As a managed IT services and cybersecurity provider, Celeris Networks likely holds sensitive client data across multiple industries including legal and accounting, amplifying the downstream risk to third parties.The group Sinobi claims to have compromised Celeris Networks and has published data (disclosed status: data_published), though the specific nature of exfiltrated data and whether encryption occurred are not detailed in the post.
What the group claims
Celeris Networks is a business IT support provider based in Knoxville, specializing in managed IT services, cybersecurity solutions, and cloud managed services. The firm serves various industries, including accounting, distribution, legal services, nonprofits, and professional services. Composed of expert technology specialists, Celeris Networks aims to alleviate IT challenges and help local businesses maximize productivity. With a commitment to personalized service, they ensure that clients receive dedicated support tailored to their needs.
Sources
Source
Indexed 15 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
