Ransomware victim disclosure
← All victimsGrayMatter (graymatter.co.in)
listed as Graymatter · Claimed by sinobi · listed 3 months ago
Status timeline
- Listed
Feb 20, 2026
- Data leaked
At a glance
- Group
- sinobi
- Status
- Data leaked
- Country
- United Kingdom
- Sector
- Not Found
- Listed on leak site
- Feb 20, 2026
About the victim
AI dossier — public-source company profileGrayMatter is a Bangalore-based IT company founded in 2006, specialising in data analytics, artificial intelligence, and Business Intelligence solutions. The company serves airport, retail, and manufacturing sectors with flagship products including Skateboard (airport/passenger analytics) and StoreSense (retail revenue and parking management). It operates primarily under the domain graymatter.co.in.
- Industry
- Data Analytics, AI & Business Intelligence Software
- Address
- Bangalore, India
- Founded
- 2006
Attack summary
Severity: high — Data has been published (not merely listed), indicating confirmed exfiltration of business data from an IT/analytics company with access to client data across airport, retail, and manufacturing sectors, implying potential exposure of sensitive business and operational information.The Sinobi ransomware group claims to have compromised GrayMatter and has published data (disclosed status: data_published), though the specific nature of exfiltrated data and volume are not detailed in the leak post.
Data the group says was taken
AI dossier — extracted from the leak post- Business data
- Internal company files
What the group claims
GrayMatter (graymatter.co.in) is a Bangalore-based IT company founded in 2006, specializing in data analytics, AI, and Business Intelligence (BI) with a strong focus on the airport, retail, and manufacturing sectors. Their flagship products, including Skateboard and StoreSense, deliver specialized, AI-driven insights for improved passenger experience, retail revenue, and parking management.
Sources
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
