Ransomware victim disclosure
← All victimsSuperloop ISP
Claimed by cyclops · listed 3 years ago
Status timeline
- Listed
Jul 14, 2023
- Data leaked
At a glance
- Group
- cyclops
- Status
- Data leaked
- Country
- Australia
- Sector
- Telecommunications
- Listed on leak site
- Jul 14, 2023
About the victim
AI dossier — public-source company profileSuperloop is an Australian ASX-listed challenger telco and internet service provider headquartered in Brisbane, Queensland. The company delivers broadband and connectivity services across consumer, business, and wholesale segments. It positions itself as a technology-driven ISP operating its own network infrastructure across Australia and select Asia-Pacific markets.
- Industry
- Internet Service Provider / Telecommunications
- Address
- Level 12, 333 Ann Street, Brisbane QLD 4000, Australia
- Employees
- 201-500
- Founded
- 2014
Attack summary
Severity: critical — Superloop is a licensed telecommunications provider with a large consumer and business customer base; exfiltration from a telco at this scale carries high risk of exposure of regulated PII (customer identity, billing, usage data) and sensitive network/infrastructure data. Data has been actively published with download links, confirming exfiltration rather than mere encryption.The Cyclops ransomware group claims to have exfiltrated data from Superloop and has published download links (via both a Tor-hosted server and clearnet file-sharing services) containing what is purported to be stolen company data, protected by supplied passwords.
Data the group says was taken
AI dossier — extracted from the leak post- Exfiltrated company files (zip archives)
- Potentially customer or business records (unspecified contents)
The group's post references roughly 4 proof files.
What the group claims
Superloop is Australia’s modern challenger telco and internet service provider that’s unleashing the unlimited possibilities of the internet. Superloop is all about experience - we're not just a utility - with a promise to be super from the ground up. We’re more tech than telco, and we deliver quality service across our consumer, business, and wholesale units.Our can-do culture will excite and ignite our customers as we deploy game-changing solutions that solve customer pain points, backed by great customer service delivered by our highly enthused team of Superloopers, who are committed to making the internet experience super. Website: ======== https://superloop.com Data: ======= http://sbibb5lw7p2sedmm3pwifopsx7ky3klxqisjbl5awgze5dk2ueuc2qqd.onion/lift_me-6.zip PASSWORD:693OK@&iCW8PYmxoE7R6TaMg9OfN29Ae http://sbibb5lw7p2sedmm3pwifopsx7ky3klxqisjbl5awgze5dk2ueuc2qqd.onion/zip file name-4.zip PASSWORD:PrNi@7L66T3x@HONyMlpa4R3Qq70jz6c https://bayfiles.com/J4qdZ0x3za PASSWORD:1$q0dz4@h*Q&I$$@igkwELCP3NDR2$dt https://bayfiles.com/J4L6Y5x2zc PASSWORD:qx6uTel$O2lLGZGeUU0yNfiEy6eh%lpU
Sources
- Victim sitesuperloop.com
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
