Ransomware victim disclosure
← All victimsBoyden
listed as BOYDEN.COM · Claimed by clop · listed 3 months ago
Status timeline
- Listed
Feb 14, 2026
- Data leaked
At a glance
- Group
- clop
- Status
- Data leaked
- Country
- United States
- Sector
- Not Found
- Listed on leak site
- Feb 14, 2026
About the victim
AI dossier — public-source company profileBoyden is a global executive search, interim management, and leadership consulting firm operating across the Americas, Europe, Asia-Pacific, and other regions. The firm serves organizations across a wide range of industries including financial services, healthcare, technology, industrial, and professional services. Boyden is one of the oldest executive search firms in the world, with a broad network of offices spanning dozens of countries.
- Industry
- Executive Search & Leadership Consulting
- Employees
- 501-1000
- Founded
- 1946
Attack summary
Severity: high — Boyden handles highly sensitive personal and professional data on C-suite executives, board members, and high-profile candidates globally; a confirmed data_published status by Clop suggests significant exfiltration of sensitive PII and confidential business records at scale across a multinational firm.Clop claims to have attacked Boyden and lists the disclosure status as data_published, indicating that data has been released; the leak post itself was not readable (redirect queue page), so specific claims about encryption or exfiltration scope cannot be confirmed from the post text.
Data the group says was taken
AI dossier — extracted from the leak post- Client engagement records
- Candidate personal data
- Executive profiles
- Business development documents
- Internal correspondence
Original description
AI-summarised, not from the leak postBoyden is a global executive search firm with over 70 offices in more than 40 countries. Founded in 1946, it is one of the oldest firms in its industry. Boyden offers services in executive search, interim management and leadership consulting, serving both public and private corporations, as well as nonprofits and startups across all industries.
The leak post
captured from the group's siteYou have been placed in a queue, awaiting forwarding to the platform. Please do not refresh the page, you will be automatically redirected.
Sources
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
