Ransomware victim disclosure
← All victimsiLife.bg
Claimed by ransomed · listed 3 years ago
Status timeline
- Listed
Oct 13, 2023
- Data leaked
At a glance
- Group
- ransomed
- Status
- Data leaked
- Country
- Bulgaria
- Sector
- Technology
- Listed on leak site
- Oct 13, 2023
About the victim
AI dossier — public-source company profileiLife.bg is a Bulgarian technology company or e-commerce platform operating under the domain ilife.bg. Based on the domain and country context, it likely sells or distributes consumer electronics, smart devices, or related technology products in Bulgaria. No additional verifiable details are available from the public site excerpt provided.
- Industry
- Consumer Electronics & Technology Retail
Attack summary
Severity: medium — Data appears to have been published (disclosed status: data_published) with a downloadable archive link, indicating confirmed exfiltration rather than a mere listing. However, the nature, sensitivity, and scale of the data are unknown, preventing a higher severity classification.The ransomed group claims to have published data belonging to iLife.bg, providing a download link (qu.ax/danH.7z) as purported proof of exfiltration. No ransom amount or specific data volume was stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Unknown exfiltrated files (compressed archive)
The group's post references roughly 1 proof file.
What the group claims
https://qu.ax/danH.7z
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
