Ransomware victim disclosure
← All victimsGovernment of Laos (gov.la)
listed as gov.la · Claimed by Ransomedvc · listed 3 years ago
Status timeline
- Listed
Sep 26, 2023
- Data leaked
At a glance
- Group
- Ransomedvc
- Status
- Data leaked
- Country
- Laos
- Sector
- Government
- Listed on leak site
- Sep 26, 2023
- Ransom demanded
- $50.000
About the victim
AI dossier — public-source company profilegov.la is the official top-level domain and web infrastructure for the Government of the Lao People's Democratic Republic. It hosts servers and digital services for multiple Laotian government ministries and agencies. The domain serves as the primary online presence for Laos's national public administration.
- Industry
- National Government & Public Administration
- Address
- Vientiane, Laos PDR
Attack summary
Severity: critical — The threat actor claims exfiltration of regulated government PII at scale — including passport data, SSNs, names, and addresses — from national government infrastructure, constituting a critical data breach affecting citizens of an entire nation.RansomedVC claims to have accessed the majority of government servers storing personal data including passport data, SSNs, names, and addresses, demanding a $50,000 ransom. The group implies exfiltration of citizen PII at scale across multiple government systems.
Data the group says was taken
AI dossier — extracted from the leak post- Passport data
- Social Security Numbers (SSNs)
- Full names
- Physical addresses
- Personal data (unspecified additional types)
What the group claims
Did I hear gov? Yep. We have accessed the majorty of their servers that were storing personal data, Passport Data,SSNs,NAMES,ADDRESSES and a lot moreWe require a ransom of $50,000
Sources
- Victim sitegov.la
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
