Ransomware victim disclosure
← All victimsVillage of Addison
listed as gis4.addison-il · Claimed by Cuba · listed 3 years ago
Status timeline
- Listed
Jul 11, 2023
- Data leaked
At a glance
- Group
- Cuba
- Status
- Data leaked
- Country
- United States
- Sector
- Government
- Listed on leak site
- Jul 11, 2023
About the victim
AI dossier — public-source company profileThe Village of Addison is a municipal government serving a community of more than 36,000 residents in Addison, Illinois. It provides local government services including public works, planning, permitting, and community services. The GIS (Geographic Information Systems) component suggests the village operates spatial data and mapping infrastructure.
- Industry
- Municipal Government
- Address
- 1 Friendship Plaza, Addison, IL 60101, United States
- Employees
- 51-200
Attack summary
Severity: high — A confirmed data publication ('data_published') from a municipal government entity serving 36,000+ residents raises significant concern for PII and civic infrastructure data exposure. Government records and GIS data can include sensitive resident and infrastructure information, and the data has reportedly already been published.The Cuba ransomware group claims to have compromised the Village of Addison's systems, with the disclosure status indicating data has been published. The leak post references the village's public-facing content, suggesting exfiltration of government data affecting a community of over 36,000 residents.
Data the group says was taken
AI dossier — extracted from the leak post- Municipal government records
- GIS / geospatial data
- Resident data
- Internal administrative documents
What the group claims
More than 36,000 people call the Village of Addison home. Whether you are new to our community, or have lived here for years, we want you to get acquainted with our community. We also want to make it easy for you to stay...
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
