Ransomware victim disclosure
← All victimsDiia (Ministry of Digital Transformation of Ukraine)
listed as diia.gov.ua · Claimed by Freecivilian · listed 3 years ago
Status timeline
- Listed
Dec 31, 2022
- Data leaked
At a glance
- Group
- Freecivilian
- Status
- Data leaked
- Country
- Ukraine
- Sector
- Government
- Listed on leak site
- Dec 31, 2022
About the victim
AI dossier — public-source company profileDiia (diia.gov.ua) is the official Ukrainian government digital services portal and mobile application developed by the Ministry of Digital Transformation of Ukraine, launched in 2020. It serves as a central platform for Ukrainian citizens to access government services electronically, store official documents (passports, driver's licences, vehicle registration, vaccination certificates), and interact with state institutions. The platform is one of the most widely used government digital identity systems in Ukraine, with tens of millions of registered users.
- Industry
- Government Digital Services & e-Governance
- Founded
- 2020
Attack summary
Severity: critical — Diia is Ukraine's primary national digital identity and e-governance platform holding PII and official document data for tens of millions of Ukrainian citizens; any confirmed exfiltration represents a massive breach of regulated personal and government data at national scale, compounded by the wartime geopolitical context.The Freecivilian group claims to have published data allegedly exfiltrated from diia.gov.ua; no ransom was stated and the disclosure status is listed as data_published, indicating the group asserts data was exfiltrated and released publicly.
Data the group says was taken
AI dossier — extracted from the leak post- Ukrainian citizen personal identity records
- Government-issued document data (passports, driver's licences)
- User account information
- Government service interaction records
Sources
- Victim sitediia.gov
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
