Ransomware victim disclosure
← All victimsCrescent Energy
listed as crescentenergyco.com · Claimed by chaos · listed 2 months ago
Status timeline
- Listed
Mar 7, 2026
- Data leaked
At a glance
- Group
- chaos
- Status
- Data leaked
- Country
- United States
- Sector
- Energy
- Listed on leak site
- Mar 7, 2026
About the victim
AI dossier — public-source company profileCrescent Energy is a growth-oriented U.S. independent energy company engaged in the acquisition, development, and operation of oil and natural gas properties. Its portfolio consists of low-decline, cash-flow-oriented assets comprising both mid-cycle unconventional and conventional assets with long reserve life. The company operates across multiple U.S. basins.
- Industry
- Oil & Gas Exploration and Production
- Employees
- 501-1000
- Founded
- 2021
Attack summary
Severity: high — Crescent Energy operates in the energy sector (critical infrastructure), and data has been confirmed published by the threat actor, indicating successful exfiltration of potentially sensitive business and operational data from a publicly traded independent energy company.The Chaos ransomware group claims to have compromised Crescent Energy and has published data, though no specific data volume or ransom demand was stated. The disclosure status indicates data has been published, suggesting exfiltration of company data.
Data the group says was taken
AI dossier — extracted from the leak post- Business operational data
- Oil and gas asset records
- Financial records
- Corporate documents
What the group claims
Crescent is a growth-oriented U.S. independent energy company engaged in the acquisition, development and operation of oil and natural gas properties. Crescents portfolio of low-decline, cash-flow oriented assets comprises both mid-cycle unconventional and conventional assets with a long reserve lif…
Sources
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
