Ransomware victim disclosure
← All victimsCellcom
Claimed by Siegedsec · listed 2 years ago
Status timeline
- Listed
Dec 8, 2023
- Data leaked
At a glance
- Group
- Siegedsec
- Status
- Data leaked
- Country
- United States
- Sector
- Telecommunications
- Listed on leak site
- Dec 8, 2023
About the victim
AI dossier — public-source company profileCellcom is a regional telecommunications provider based in Wisconsin (and separately a Washington-state carrier), offering wireless voice, data, and related services to consumers and businesses. The company operates as an independent wireless carrier serving rural and suburban markets. It provides cellular network coverage, device sales, and customer support services.
- Industry
- Regional Telecommunications & Wireless Services
- Address
- 2921 Enumclaw Rd, Port Orchard, WA 98367, United States
- Employees
- 51-200
- Founded
- 1992
Attack summary
Severity: high — SiegedSec is a known hacktivist/threat actor group with a history of confirmed data exfiltration and publication; the disclosed status is 'data_published', indicating actual data release rather than a mere listing, and telecommunications companies hold sensitive subscriber PII and network data at scale.SiegedSec claims to have compromised Cellcom and published data from the attack, with the disclosure status indicating data has been released; no ransom demand was stated and the specific volume of exfiltrated data was not quantified in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Telecommunications customer data
- Internal company files
What the group claims
telecommunications
Sources
Source
Indexed 2 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
