Ransomware victim disclosure
← All victimsAtlas Air
Claimed by Everest · listed 3 months ago
Status timeline
- Listed
Feb 6, 2026
- Data leaked
At a glance
- Group
- Everest
- Status
- Data leaked
- Country
- United States
- Sector
- Transportation/Logistics
- Listed on leak site
- Feb 6, 2026
About the victim
AI dossier — public-source company profileAtlas Air Worldwide Holdings is a U.S.-based aviation services company headquartered in Purchase, New York, operating one of the world's largest fleets of wide-body freighter aircraft. The company provides outsourced aircraft and aviation operating services to airlines, freight forwarders, and the U.S. military. Atlas Air serves global customers through scheduled and charter cargo operations.
- Industry
- Air Cargo & Charter Services
- Address
- 2000 Westchester Avenue, Purchase, New York 10577, United States
- Employees
- 1000-5000
- Founded
- 1992
Attack summary
Severity: high — Atlas Air is a major air cargo operator with ties to U.S. military logistics; confirmed data publication by the group suggests significant business and potentially sensitive operational data was exfiltrated and released, posing high risk to operations and personnel.The Everest ransomware group claims to have attacked Atlas Air and lists the incident as 'data_published', indicating exfiltration and publication of data. The leak post itself is minimal and does not specify the volume or exact nature of data published.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate business data
- Employee records
- Operational documents
- Financial records
Original description
AI-summarised, not from the leak postAtlas Air Worldwide Holdings Inc. is a cargo and passenger charter airline based in Purchase, NY. Founded in 1992, Atlas Air operates globally with a large and efficient fleet of Boeing 747 aircraft. The company offers a variety of services like outsourced aircraft, crew maintenance, and insurance (ACMI), charter businesses, and dry leasing.
The leak post
captured from the group's site© 2026, All rights reserved Citizens Bank - Database Leaked Evaluate a Norstella company - Database Leaked Studio Marchi - Studio Professionale Associato - Database Leaked Super AI - Database Leaked Complete Aircraft Group - Database Leaked Umiles Group - Database Leaked K Subsea Group - Database Leaked Parque Eólico Toabré - Database Leaked PT Brantas Abipraya - Database Leaked Straight Line Logistics - Database Leaked First Priority Group - Database Leaked Hyundai Elevator - Database Leaked UD Trucks - Database Leaked McDonalds India - Database Leaked Tsunami Tsolutions - Database Leaked Atlas Air: MUSE INSECURE - Database Leaked Iron Mountain - Database Leaked Hosowaka Micron Group - Database Leaked Shinwa Co Ltd - Database Leaked SIGMA Processing Group - Database Leaked Acu Trans Solutions LLC - Database Leaked GIBSIN Engineers - Database Leaked ASRock Rack - Database Leaked Reeves Information Technology - Database Leaked WANCHI STEEL INDUSTRIAL - Database Leaked GC Accounting - Database Leaked National Money Mart Company - Database leaked Virginia Records - Database Leaked Morgan Records Management - Database leaked ELC Electroconsult SpA - Databas…
Sources
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
