Ransomware victim disclosure
← All victimsarc-reins.com + fidelityunited.ae UPDATE-FULL DATA DUMP
Claimed by stormous · listed 9 days ago
Status timeline
- Listed
May 11, 2026
- Data leaked
At a glance
- Group
- stormous
- Status
- Data leaked
- Country
- United Arab Emirates
- Sector
- Financial Services
- Listed on leak site
- May 11, 2026
About the victim
AI dossier — public-source company profilearc-reins.com and fidelityunited.ae appear to be insurance broking entities operating in the Middle East, with ARC involved in marine, property, civil liability, and risk insurance, and Fidelity United operating in the UAE financial services sector. Both firms work with major international partners and maintain extensive KYC and compliance records. The combined entity handles insurance deals across the Middle East region.
- Industry
- Insurance Brokerage & Financial Services
Attack summary
Severity: critical — 700 GB of confirmed exfiltrated and published data includes regulated financial and insurance records, large-scale PII (passports, IDs, personal documents) for employees and clients, KYC files (regulated identity data), banking details, and credentials — spanning two financial-sector entities in the UAE. The combination of regulated data at scale, credential exposure, and full publication meets the critical threshold.Stormous claims to have exfiltrated approximately 600–700 GB of data from both organisations, including compliance audit data, bank details, KYC files, employee personal documents (passports, IDs), insurance archives, client lists, and internal credentials. The data has been published (disclosed status: data_published), indicating full exfiltration with no stated encryption component.
Data the group says was taken
AI dossier — extracted from the leak post- Compliance audit data
- Bank account details
- Legal licenses
- Tax documents
- Official contracts
- KYC and KYC TOBA files
- Employee passports and ID cards
- Employee emails and career details
- Manager contracts and internal communications
- Marine insurance archive (Middle East deals)
- Property insurance records
- Civil liability insurance records
- Risk insurance records
- Monthly and annual quality control reports
- Collective agreements with international partners
- Administrative data
- Business travel logs
- Passwords and credentials
- DC client lists
- Digital identities and official signatures
- Major client list
- Personal information records for brokers
What the group claims
We have gained full control over 700 GB of data, which includes: meticulous compliance audit data, complete Bank details for ARC, legal licenses, tax documents, and official contracts, as well as KYC and KYC TOBA files for all partners.Additionally, personal data for all employees has been extracted, including passports, ID cards, emails, career details, personal documents, and contracts for managers and internal communications. The breach also covers the marine insurance archive with all its deals in the Middle East, property insurance, civil liability, and risk insurance, in addition to monthly and annual quality control reports and collective agreements with major international partners.We have full control over administrative data, business travel logs, passwords, and DC client lists, along with all internal correspondence, digital identities, and official company signatures. The data also includes a list of major clients and thousands of personal information records for Fidelity and ARC brokers, including their full personal details. All of this and more, totaling 600 GB of secrets.
Source
Indexed 9 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
