Ransomware victim disclosure
← All victimsiLife.bg
Claimed by Ransomedvc · listed 3 years ago
Status timeline
- Listed
Oct 13, 2023
- Data leaked
At a glance
- Group
- Ransomedvc
- Status
- Data leaked
- Country
- Bulgaria
- Sector
- Technology
- Listed on leak site
- Oct 13, 2023
About the victim
AI dossier — public-source company profileiLife.bg appears to be a Bulgarian technology company or e-commerce retailer operating under the domain ilife.bg. Based on the domain naming convention, it is likely associated with consumer electronics, smart devices, or lifestyle technology products sold in Bulgaria. No public site content was available to confirm further operational details.
- Industry
- Technology / Consumer Electronics & Lifestyle Products
Attack summary
Severity: medium — Data has been published (disclosed status: data_published) and a download link is provided, indicating confirmed exfiltration; however, the nature, sensitivity, and scale of the data are unknown, preventing a higher severity classification.Ransomedvc claims to have exfiltrated data from iLife.bg and has published a download archive link (qu.ax/danH.7z) as proof of the breach; the specific contents and volume of the exfiltrated data are not described in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Unknown exfiltrated files (published archive)
The group's post references roughly 1 proof file.
What the group claims
https://qu.ax/danH.7z
Sources
- Victim siteilife.bg
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
