Ransomware victim disclosure
← All victimsz*l*c.o*g
Claimed by devman · listed 4 months ago
Status timeline
- Listed
Jan 28, 2026
- Data leaked
At a glance
- Group
- devman
- Status
- Data leaked
- Country
- United States
- Sector
- Not Found
- Listed on leak site
- Jan 28, 2026
About the victim
AI dossier — public-source company profileThe victim is identified only by the partially redacted domain 'z*l*c.o*g', which resolves to a .org domain suggesting a non-profit or association. No public site content was available to further characterize the organization's activities, location, or scale.
Attack summary
Severity: critical — The group claims confirmed exfiltration of SSNs (regulated PII) alongside financial and audit records, constituting a significant breach of sensitive personal and financial data meeting the critical threshold.The group 'devman' claims to have exfiltrated PII data, Social Security Numbers (SSNs), and financial and audit reports from the victim organization, with the data published as disclosed.
Data the group says was taken
AI dossier — extracted from the leak post- Personally Identifiable Information (PII)
- Social Security Numbers (SSNs)
- Financial reports
- Audit reports
What the group claims
PII data, SSN´s financial and audit reports.
Sources
- Victim sitez*l*c.o*g
- Leak posthttp://devmanblggk7ddrtqj3tsocnayow3bwnozab2s4yhv4shpv6ueitjzid.onion
Source
Indexed 4 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
