Ransomware victim disclosure
← All victims**.at
Claimed by devman · listed 4 months ago
Status timeline
- Listed
Jan 25, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileThe victim is identified only by a redacted Austrian domain ('**.at'). No public site content or leak post details were captured, making it impossible to determine the company's identity, operations, or scale.
Attack summary
Severity: medium — Status is 'data_published' indicating exfiltration and release occurred, which elevates severity above low, but the complete absence of any detail on data type, scale, or sensitivity prevents a higher classification.The group 'devman' has listed this Austrian entity with a status of 'data_published', implying data was exfiltrated and published, though no specific claims about encryption, exfiltration methods, or data types are available from the captured post.
Sources
- Victim site**.at
- Leak posthttp://devmanblggk7ddrtqj3tsocnayow3bwnozab2s4yhv4shpv6ueitjzid.onion
Source
Indexed 4 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
