Ransomware victim disclosure
← All victimsCR2
Claimed by Avoslocker · listed 3 years ago
Status timeline
- Listed
Dec 26, 2022
- Data leaked
At a glance
- Group
- Avoslocker
- Status
- Data leaked
- Country
- Singapore
- Sector
- Financial Services
- Listed on leak site
- Dec 26, 2022
- Data size
- 500 GB
About the victim
AI dossier — public-source company profileCR2 is an Irish-owned banking software company headquartered in Dublin, Ireland, that provides mobile, internet, and ATM financial service technology to more than 100 retail banks across Africa, the Middle East, and Asia. Its flagship products include BankWorld, BankWorld POS, and BankWorld ATM. Customers include major institutions such as ANZ, Barclays, Standard Chartered, Access Bank, and Orabank.
- Industry
- Banking Software & Financial Technology
- Address
- Dublin, Ireland (headquarters); offices in Dubai, London, Cairo, Amman, Bengaluru, Lagos, Johannesburg, Singapore, Perth
Attack summary
Severity: critical — Exfiltration of banking software source code affecting 100+ global retail banks, combined with PII from Active Directory, financial records, and client-bank sensitive data, represents a systemic supply-chain risk to critical financial infrastructure at scale — meeting the threshold for critical severity.AvosLocker claims to have exfiltrated over 500 GB of data from CR2, including full source code for all products ever developed, financial and HR documents, accounting files, and sensitive information pertaining to more than 100 banks worldwide. The group has published sample proof including a large file list, random files, a shareholders email list, and a full Active Directory user export.
Data the group says was taken
AI dossier — extracted from the leak post- Source code for all products (BankWorld, BankWorld POS, BankWorld ATM)
- Financial records
- HR documents
- Accounting files
- Sensitive information on 100+ client banks
- Shareholders email list
- Active Directory user list (names, titles, phone numbers, emails)
The group's post references roughly 3 proof files.
What the group claims
CR2 is an Irish-owned banking software company which provides mobile, internet and ATM financial service technology to more than 100 retail banks across Africa, the Middle East and Asia. Headquartered in Dublin, Ireland, the company has offices in Dubai, London, Cairo, Amman, Bengaluru, Lagos, Johannesburg, Singapore and Perth. Its customers include ANZ, Barclays, Standard Chartered, Botswana Savings Bank, Jordanian Bank al Etihad,pan-African bank Orabank, and Nigeria’s Access Bank plc and Diamond Bank. 500 GB+ Data includes: - Sources to all products ever developed including BankWorld, BankWorld POS & ATM. - Financials - HR documents - Accounting files - Sensitive information on more than 100 banks worldwide Sample includes the compressed 500 MB large file list and a couple random files for proof, shareholders e-mail list, all active directory users with their names, titles, phone numbers, and e-mails. (28.8 MB compressed)
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
