Ransomware victim disclosure
← All victimsproject1631.com
Claimed by beast · listed 2 months ago
Status timeline
- Listed
Apr 2, 2026
- Data leaked
At a glance
- Group
- beast
- Status
- Data leaked
- Country
- United States
- Sector
- Not Found
- Listed on leak site
- Apr 2, 2026
About the victim
AI dossier — public-source company profileProject 1631 operates under the domain project1631.com and is based in the United States. No public site content was available to determine the nature of the business, its scale, or its area of operations. The company's industry and activities remain unverifiable from available evidence.
Attack summary
Severity: medium — Data has been marked as published (disclosed status: data_published), suggesting exfiltration occurred and material has been released; however, no details about data type, sensitivity, or scale are available to elevate this to high or critical.The Beast ransomware group has listed project1631.com as a victim with a disclosed status of data_published, indicating data has been released. No further details about the method of attack, volume of exfiltrated data, or specific data categories were provided in the leak post.
What the group claims
project1631.com
The leak post
captured from the group's siteAJU Pharm Co., Ltd. is a prominent South Korean total healthcare company founded in 1953. For over 70 years, it has evolved from a manufacturer of raw materials into a global pharmaceutical group specializing in prescription drugs, medical devices, and health supplements P U B L I S H E D
Sources
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
