Ransomware victim disclosure
← All victimsB2BE
listed as b2be.com · Claimed by chaos · listed 5 months ago
Status timeline
- Listed
Dec 8, 2025
- Data leaked
At a glance
- Group
- chaos
- Status
- Data leaked
- Country
- MY
- Sector
- Technology
- Listed on leak site
- Dec 8, 2025
About the victim
AI dossier — public-source company profileB2BE provides a comprehensive suite of supply chain management solutions designed to enhance visibility, control, and efficiency for businesses globally. Their offerings include document management, e-invoicing, EDI (Electronic Data Interchange), and automation tools tailored for both customer and supplier engagement. The company operates internationally with a registered web presence at b2be.com and is associated with Malaysia.
- Industry
- Supply Chain Management & B2B Integration Software
Attack summary
Severity: high — Data has been confirmed as published by the threat actor. B2BE handles sensitive B2B supply chain data including financial documents, e-invoicing, and EDI records for multiple businesses globally, meaning the breach likely exposes significant business and potentially financial data across their client base.The Chaos ransomware group claims to have attacked B2BE and has published data (disclosed status: data_published), suggesting exfiltration of company data. The specific volume of stolen data has not been stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Document management records
- E-invoicing data
- EDI transaction data
- Customer engagement data
- Supplier engagement data
- Business automation data
What the group claims
B2BE provides a comprehensive suite of supply chain management solutions designed to enhance visibility, control, and efficiency for businesses globally. Their offerings include document management, e-invoicing, EDI, and automation tools tailored for both customer and supplier engagement. Targeting…
Sources
Source
Indexed 5 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
