Ransomware victim disclosure
← All victimsShirin Travel Agency
Claimed by Arvinclub · listed 3 years ago
Status timeline
- Listed
Oct 1, 2023
- Data leaked
At a glance
- Group
- Arvinclub
- Status
- Data leaked
- Country
- Iran
- Sector
- Hospitality
- Listed on leak site
- Oct 1, 2023
About the victim
AI dossier — public-source company profileShirin Travel Agency is an Iranian travel agency operating in the hospitality and tourism sector. Based on its name and country of registration, it likely provides travel booking, tour packages, and related services to customers in Iran. No further verifiable details are available from the provided sources.
- Industry
- Travel Agency & Tourism
Attack summary
Severity: medium — Data has been published (disclosed status confirmed), suggesting exfiltration occurred, but no details on data volume, sensitivity, or PII scale are available to elevate to high or critical.The group Arvinclub claims to have published data belonging to Shirin Travel Agency, with a downloadable archive file linked via an onion-hosted URL indicating exfiltration and public disclosure of data.
Data the group says was taken
AI dossier — extracted from the leak post- Exfiltrated company data (archive file)
The group's post references roughly 1 proof file.
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
