Ransomware victim disclosure
← All victimscrystalhotels
Claimed by stormous · listed 19 days ago
Status timeline
- Listed
May 2, 2026
- Data leaked
At a glance
- Group
- stormous
- Status
- Data leaked
- Country
- Turkey
- Sector
- Hospitality and Tourism
- Listed on leak site
- May 2, 2026
About the victim
AI dossier — public-source company profileCrystal Hotels is a hospitality company operating in Turkey, active in the hotel and tourism sector. Based on the victim name and sector classification, the company manages hotel properties and handles guest bookings, communications, and customer service operations. No public website content was available to confirm further operational details or scale.
- Industry
- Hospitality & Hotel Management
Attack summary
Severity: high — Confirmed exfiltration and publication of guest PII (full names, email addresses) combined with internal business communications and booking records constitutes significant data exposure; while not at the scale of regulated medical or financial data, the combination of personal guest data and internal operational data warrants a high severity rating.The Stormous ransomware group claims to have exfiltrated internal data from Crystal Hotels, including guest personal information, internal communications, and booking records. The data has been published (disclosed status: data_published), indicating exfiltration without a stated ransom.
Data the group says was taken
AI dossier — extracted from the leak post- Full names of hotel guests
- Email addresses (internal and external)
- Customer complaints and feedback content
- Booking or reference numbers
- Internal hotel communication data
What the group claims
Full names of hotel guests, Email addresses (internal and external), Customer complaints and feedback content, Booking or reference numbers, Internal hotel communication data...
Source
Indexed 19 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
