Ransomware victim disclosure
← All victimsNew Obscura 2.0!
Claimed by obscura · listed 5 months ago
Status timeline
- Listed
Dec 12, 2025
- Data leaked
At a glance
- Group
- obscura
- Status
- Data leaked
- Country
- United States
- Sector
- Not Found
- Listed on leak site
- Dec 12, 2025
About the victim
AI dossier — public-source company profileThe Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States federal government, headquartered at 935 Pennsylvania Ave NW, Washington, DC. It operates under the U.S. Department of Justice and is responsible for investigating federal crimes, counterterrorism, counterintelligence, and cybercrime across the United States. The FBI maintains field offices domestically and legal attaché offices overseas.
- Industry
- Federal Law Enforcement & Intelligence
- Address
- 935 Pennsylvania Ave NW, Washington, DC 20535
- Founded
- 1908
Attack summary
Severity: low — The post is a ransomware platform advertisement/announcement with no credible claim of a successful attack on the FBI, no proof files, no exfiltrated data, and no stated operational impact. The FBI domain appears to be a placeholder or deliberate misdirection.The post does not describe an attack on the FBI; rather, it is a ransomware-as-a-service advertisement by the 'Obscura' group announcing version 2.0 of their ransomware platform, touting faster encryption, bug fixes, and covert operation. No specific exfiltration or encryption of FBI systems is claimed.
What the group claims
We present the new version of Obscura 2.0. Faster encryption mechanisms, bugs fixed in the first version, more covert operation, and more upset companies. Now you can rent our software. You can write to us on Tox, where we will tell you about the terms and conditions.
Sources
- Victim sitefbi.gov
Source
Indexed 5 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
