Ransomware victim disclosure
← All victimsenersolcr
Claimed by stormous · listed 19 days ago
Status timeline
- Listed
May 2, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileEnersolcr appears to be an energy sector company based in Costa Rica (country code CR). Based on the victim name and sector classification, it likely operates in energy supply, distribution, or related services within the Costa Rican market. No public website content was available to confirm further operational details.
- Industry
- Energy Services
Attack summary
Severity: high — Confirmed exfiltration and publication of customer PII (names, emails, phone numbers), partner data, and administrative credentials from an energy sector company. The combination of published PII at scale and admin/credential data in a critical infrastructure sector warrants a high severity rating; critical would require confirmed regulated data (e.g. financial records, medical) at larger scale.The Stormous ransomware group claims to have exfiltrated internal system data, partner data (73 partners referenced), customer data including email addresses, names, and phone numbers, as well as administrative credentials and role information. The disclosure status is listed as data_published, indicating the stolen data has been released.
Data the group says was taken
AI dossier — extracted from the leak post- Internal system data
- Partner data (73 partners)
- Customer email addresses
- Customer names
- Customer phone numbers
- Admin credentials and role assignments
What the group claims
Internal Data - System Data - 73 Partner Data - Customer Data (Email, Name, Phone Number) - Admin Data and Their Roles, etc....
Source
Indexed 19 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
