Ransomware victim disclosure
← All victimsJozef Stefan Institute (IJS)
Claimed by coinbasecartel · listed 10 days ago
Status timeline
- Listed
May 11, 2026
- Data leaked
At a glance
- Group
- coinbasecartel
- Status
- Data leaked
- Country
- SI
- Sector
- Education
- Listed on leak site
- May 11, 2026
About the victim
AI dossier — public-source company profileJozef Stefan Institute (IJS) is Slovenia's leading multidisciplinary research institution, headquartered in Ljubljana. It conducts fundamental and applied research across physics, chemistry, biochemistry, electronics, information technology, environmental sciences, and nuclear technology. It also trains postgraduate researchers and collaborates with national and international academic and industrial partners.
- Industry
- Scientific Research & Development
- Address
- Jamova cesta 39, 1000 Ljubljana, Slovenia
- Employees
- 1000-2000
- Founded
- 1949
Attack summary
Severity: high — Data is listed as published (confirmed exfiltration) from a nationally significant scientific research institution involved in nuclear technology, quantum computing, and defence-adjacent research; exfiltration of such research data carries significant national and scientific security implications even without explicit PII-at-scale confirmation.The group 'coinbasecartel' claims to have published data exfiltrated from Jozef Stefan Institute, with the disclosure status listed as 'data_published'. No ransom amount or specific data volume has been stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Research data
- Employee records
- Internal documents
- Project/collaboration files
Original description
AI-summarised, not from the leak postJozef Stefan Institute (IJS) is Slovenia's leading research institution, headquartered in Ljubljana. It operates across multiple scientific disciplines including physics, chemistry, biochemistry, electronics, information technology, and environmental sciences. Founded in 1949, it conducts fundamental and applied research, hosts numerous national and international projects, and collaborates with academic and industrial partners. It also plays a key role in educating postgraduate researchers in Slovenia.
The leak post
captured from the group's siteSystem Breach • Coinbasecartel We are looking for new partners/insiders. Send us a message to dicuss We are looking for new partners/insiders. Send us a message to dicuss CRITICAL ANNOUNCEMENTS × Contact Update We have changed our contact method. We now exclusively use qTox Messenger for all communications. SimpleX and Session have been discontinued. Our Tox ID: A7580331D4D16453CCE86D7ADFBCF0CEED0D0D1AEA8F4DBEEBCA9E3B46308F260DE9B41BD838 TO APTIM You may have noticed the sudden, heavy silence. The corporate VPNs are dead. We have been the silent architects of your network for the past three weeks. While your "elite" investigators from Mandiant sat in your logs, we sat directly beside them burning through over a hundred of your corporate identities like disposable tools. we have had your entire network and internal protocols. HOW LONG WILL YOU KEEP YOUR THOUSANDS OF FIELD WORKERS LOCKED OUT? We have successfully exfiltrated the most sensitive engineering data held by any firm in your sectors We hold the complete Navisworks 3D models, P&ID diagrams, and maintenance logic for your major energy plants. This includes the granular Honeywell DCS controller logic. We know…
Sources
Source
Indexed 10 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
