Ransomware victim disclosure
← All victimsPatchwire
listed as ***wire · Claimed by vect · listed 3 months ago
Status timeline
- Listed
Feb 24, 2026
- Data leaked
At a glance
- Group
- vect
- Status
- Data leaked
- Country
- United States
- Sector
- Not Found
- Listed on leak site
- Feb 24, 2026
About the victim
AI dossier — public-source company profile***wire (likely a law firm or legal services provider operating under a name ending in 'wire') is based in the United States and operates in the legal sector, as indicated by the ransomware group's sector classification of 'LAW'. No further details about scale or specific practice areas are available from public sources at this time.
- Industry
- Legal Services
Attack summary
Severity: high — The victim operates in the legal sector, where data is likely to include privileged attorney-client communications, sensitive client PII, and confidential case materials. The 'data_published' status confirms exfiltration and active disclosure, elevating severity even without a specific data volume stated.The group 'vect' claims to have attacked the victim and lists the status as 'NEGOTIATING', suggesting an active extortion attempt with a stated deadline of approximately 18 days; the disclosed status of 'data_published' indicates some data has been released or made available as leverage.
Data the group says was taken
AI dossier — extracted from the leak post- Legal documents
- Client records
- Case files
- Potentially privileged communications
What the group claims
Status: STATUS: NEGOTIATING | Sector: LAW | Deadline: 18d 7h
Sources
- Victim site***wire.com
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
