Ransomware victim disclosure
← All victimsOneSupport
listed as ONESUPPORT.COM · Claimed by Cl0p · listed 3 months ago
Status timeline
- Listed
Feb 14, 2026
- Data leaked
At a glance
- Group
- Cl0p
- Status
- Data leaked
- Country
- United States
- Sector
- Technology
- Listed on leak site
- Feb 14, 2026
About the victim
AI dossier — public-source company profileOneSupport is a U.S.-based company offering a unified customer experience (CX) platform and cloud contact center solutions. They provide 24/7 technical support services for individuals and businesses, covering internet connectivity, devices, and software applications. Their platform is designed to deliver scalable, high-quality support operations.
- Industry
- Unified CX Platform & Cloud Contact Center Services
Attack summary
Severity: medium — Data has been marked as published by Cl0p, a prolific ransomware group known for large-scale exfiltration; however, the leak post is AI-generated with no specific data categories, file counts, or proof artifacts disclosed, preventing a higher severity classification. OneSupport's contact center role means potential exposure of customer PII warrants at least medium severity.Cl0p claims to have compromised OneSupport and has published data (disclosed status: data_published), though the leak post does not specify whether encryption, exfiltration, or both occurred, nor does it detail the volume or category of data involved.
Original description
AI-summarised, not from the leak postONESUPPORT.COM is a company that offers a variety of technical assistance options to individuals and businesses. Services include troubleshooting and problem-solving for issues relating to internet connectivity, devices, software applications, and more. Their team of professionals provides 24/7 support, aiming to deliver high-quality, user-friendly and efficient solutions based on user needs.
Sources
- Victim siteONESUPPORT.COM
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
