Ransomware victim disclosure
← All victimsAltpro
Claimed by coinbasecartel · listed 1 month ago
Status timeline
- Listed
Apr 18, 2026
- Data leaked
At a glance
- Group
- coinbasecartel
- Status
- Data leaked
- Country
- Croatia
- Sector
- Not Found
- Listed on leak site
- Apr 18, 2026
About the victim
AI dossier — public-source company profileAltpro is a Croatian company specialising in signal-safety systems for railway infrastructure and rolling stock, including train detection, axle counters, level-crossing protection, and ETCS/ATP onboard systems. With over 30 years of experience, it exports to more than 55 countries across 6 continents and employs over 200 engineers and specialists across 5 regional locations. Its products are certified to SIL 4 international safety standards and have been deployed in projects with partners such as Bombardier/Alstom and CRRC.
- Industry
- Railway Signalling & Safety Systems
- Address
- Croatia (headquarters; 5 regional locations globally)
- Employees
- 200+
Attack summary
Severity: high — Altpro operates in critical railway safety infrastructure (SIL 4 certified systems) across 55+ countries. Even without detailed leak post content, a confirmed data-published status against a critical-infrastructure supplier operating internationally represents a significant threat; any exfiltrated data could include proprietary safety-system designs, project documentation, or partner/client data relevant to national rail networks.The coinbasecartel ransomware group has listed Altpro as a victim with a disclosed/published status, claiming data has been published; however, no ransom amount, data volume, or detailed leak post content was provided, making it impossible to confirm the scope or nature of the exfiltration or encryption.
Original description
AI-summarised, not from the leak postN/A
The leak post
captured from the group's siteSystem Breach • Coinbasecartel We are looking for new partners/insiders. Send us a message to dicuss We are looking for new partners/insiders. Send us a message to dicuss CRITICAL ANNOUNCEMENTS × Contact Update We have changed our contact method. We now exclusively use qTox Messenger for all communications. SimpleX and Session have been discontinued. Our Tox ID: A7580331D4D16453CCE86D7ADFBCF0CEED0D0D1AEA8F4DBEEBCA9E3B46308F260DE9B41BD838 TO APTIM You may have noticed the sudden, heavy silence. The corporate VPNs are dead. We have been the silent architects of your network for the past three weeks. While your "elite" investigators from Mandiant sat in your logs, we sat directly beside them burning through over a hundred of your corporate identities like disposable tools. we have had your entire network and internal protocols. HOW LONG WILL YOU KEEP YOUR THOUSANDS OF FIELD WORKERS LOCKED OUT? We have successfully exfiltrated the most sensitive engineering data held by any firm in your sectors We hold the complete Navisworks 3D models, P&ID diagrams, and maintenance logic for your major energy plants. This includes the granular Honeywell DCS controller logic. We know…
Sources
Source
Indexed 1 month agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
