Ransomware victim disclosure
← All victimsplayroll
Claimed by Killsecurity · listed 5 months ago
Status timeline
- Listed
Dec 9, 2025
- Data leaked
At a glance
- Group
- Killsecurity
- Status
- Data leaked
- Country
- United Kingdom
- Sector
- Not Found
- Listed on leak site
- Dec 9, 2025
About the victim
AI dossier — public-source company profilePlayroll is a global HR, payroll, and compliance platform headquartered in the United Kingdom. It offers Employer of Record (EOR) services, contractor management, global payroll processing across 35+ regions, immigration support in 95+ countries, and related workforce solutions for businesses of all sizes. The platform serves startups, small businesses, and enterprises seeking compliant international hiring and payroll management.
- Industry
- Global HR, Payroll & Compliance Technology (EOR / HRTech)
- Employees
- 51-200
Attack summary
Severity: high — Playroll processes payroll, HR, and compliance data for global employers and their workforces, meaning any confirmed exfiltration would likely encompass sensitive employee PII (names, banking details, salaries, tax information, immigration records) at scale across multiple countries. The 'data_published' status elevates severity even absent explicit proof details.KillSecurity claims to have published data related to Playroll (disclosed status: data_published), though the leak post contains minimal detail — no ransom amount, no stated data volume, and only a single disclosure slot noted. The nature of exfiltrated data and scope of the attack have not been elaborated upon in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Unknown — no data inventory specified in leak post
What the group claims
Price ??? Disclosures 0/1
Sources
- Victim siteplayroll.com
Source
Indexed 5 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
