Ransomware victim disclosure
← All victimsUtah-Yamas Controls
Claimed by Royal · listed 3 years ago
Status timeline
- Listed
May 22, 2023
- Data leaked
At a glance
- Group
- Royal
- Status
- Data leaked
- Country
- United States
- Sector
- Manufacturing
- Listed on leak site
- May 22, 2023
About the victim
AI dossier — public-source company profileUtah Yamas Controls is a US-based company operating primarily in Utah, Idaho, and Nevada that provides access control, security cameras, and building automation systems for both residential and commercial clients. They serve state and federal government contracts and also offer service, repair, and energy-saving solutions for control systems and security equipment. The company operates an online store for related products.
- Industry
- Access Control, Security Systems & Building Automation
- Address
- Utah, United States
Attack summary
Severity: high — Data has been confirmed as published (exfiltrated), including technical drawings and internal reports from a company holding state and federal government security contracts. Exposure of access control and building automation system data for government facilities poses significant security risk beyond typical business data.The Royal ransomware group claims to have exfiltrated data from Utah Yamas Controls, publishing reports, drawings, and user folder contents as proof of access. The disclosed status indicates data has been published rather than merely threatened.
Data the group says was taken
AI dossier — extracted from the leak post- Internal reports
- Technical drawings
- User folders
What the group claims
Reports \ Drawings \ Users Folders
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
