Ransomware victim disclosure
← All victimsNovo Ingresso
listed as novoingresso.com.br · Claimed by ransomed · listed 3 years ago
Status timeline
- Listed
Oct 13, 2023
- Data leaked
At a glance
- Group
- ransomed
- Status
- Data leaked
- Country
- Brazil
- Sector
- Media & Entertainment
- Listed on leak site
- Oct 13, 2023
About the victim
AI dossier — public-source company profileNovo Ingresso is a Brazilian technology company offering complete management solutions for events and institutions, including ticketing and event administration services. The company operates primarily in Brazil and serves event organizers and institutional clients through its online platform at novoingresso.com.br.
- Industry
- Event Management & Ticketing Technology
Attack summary
Severity: high — Data has been confirmed published (disclosed status: data_published) with a downloadable sample. As a ticketing and event management platform, servers likely contain customer PII (names, contact details, payment data) from event attendees, elevating severity. Shared-server exfiltration also risks third-party data exposure.The group claims to have gained access to the company's main servers and exfiltrated data, including data belonging to the company and potentially co-hosted third parties on a shared server. A sample archive has been published as proof of the breach.
Data the group says was taken
AI dossier — extracted from the leak post- Server data
- Company internal files
- Potentially shared-hosting third-party data
- Sample archive (published)
The group's post references roughly 1 proof file.
What the group claims
Our group was able to access everything from the main company servers, and it happened that their data was on the server too(shared) Sample: https://qu.ax/LHRf.gz
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
