Ransomware victim disclosure
← All victimsGetly
Claimed by killsec · listed 3 months ago
Status timeline
- Listed
Feb 9, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileGetly (operated by Getly Technologies Limited, a subsidiary of Takeout Media Ltd) is a Nigeria- and Qatar-based travel super-app offering cross-border prepaid payment cards, multi-currency wallets, eSIMs, and a local vendor discovery tool for travellers, expats, and digital nomads. The company is registered as a Money Lending Agent under the High Court of Nigeria and is audited for compliance with the Nigeria Data Protection Regulation (NDPR). It operates primarily in Nigeria and Qatar, backed by Qatar's Premier Innovation Hub.
- Industry
- Travel & Fintech Super-App (Payments, eSIMs, Vendor Discovery)
- Address
- 36 Sokode Crescent, Wuse Zone 5, Abuja, Nigeria
Attack summary
Severity: high — Getly handles cross-border payments, prepaid debit cards, multi-currency wallets, and personal financial data for travellers and migrants, placing it squarely in regulated fintech territory. Data publication is confirmed (data_published status), and the nature of the platform means exfiltrated data likely includes PII and financial records subject to NDPR; however, the lack of stated data volume or explicit proof files prevents a 'critical' rating.KillSec claims to have compromised Getly and has published data (disclosed status: data_published), though the leak post itself is minimal with no ransom amount stated and only a single disclosure slot indicated. No specific data volume or file count is described in the post.
Data the group says was taken
AI dossier — extracted from the leak post- User account data
- Financial transaction records
- Payment card information
- eSIM subscription details
- Personal identification information (travellers/expats)
- Contact and communication data
What the group claims
Price ??? Disclosures 0/1
Sources
- Victim sitegetly.app
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
