Ransomware victim disclosure
← All victimsAuvo
Claimed by vect · listed 3 months ago
Status timeline
- Listed
Feb 24, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileAuvo is a Brazilian SaaS company offering a field service management platform for external teams. Its product suite covers team scheduling, PMOC (preventive maintenance plans), financial management, billing, customer satisfaction, and integrations with major ERPs. It serves sectors including HVAC, solar energy, electronic security, technical assistance, facilities, and elevator maintenance.
- Industry
- Field Service Management Software (SaaS)
Attack summary
Severity: high — 372.78 GB of data has been confirmed exfiltrated and published, including significant business and procurement records. As a SaaS platform, the breach may also implicate customer data of Auvo's clients, elevating overall business impact.The 'vect' ransomware group claims to have exfiltrated 372.78 GB of data from Auvo and has published it; the leaked data reportedly includes purchasing and procurement records, supplier and vendor documentation, purchase orders, order history, quotations, pricing negotiations, and fabric/materials specifications.
Data the group says was taken
AI dossier — extracted from the leak post- Purchasing and procurement records
- Supplier and vendor documentation
- Purchase orders and order history
- Quotations and pricing negotiations
- Fabric and materials specifications
What the group claims
Status: STATUS: LEAKED | Sector: IT | │ ├─Purchasing and procurement records │ ├─Supplier and vendor documentation │ ├─Purchase orders and order history │ ├─Quotations and pricing negotiations │ ├─Fabric and materials specificatio... DATA SIZE: 372.78 GB
Sources
- Victim siteauvo.com
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
