Ransomware victim disclosure
← All victimsorekait.com
Claimed by lockbit5 · listed 20 days ago
Status timeline
- Listed
May 1, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileOreka IT is a Spanish IT consulting and digital transformation company specializing in ERP, CRM, and MES solutions, primarily built around SAP products and Microsoft platforms. The company serves both large enterprises and SMEs across industries including aerospace, chemicals, fashion, pharmaceuticals, and automotive, predominantly in the Basque Country region of Spain. It also develops proprietary software modules and provides IT infrastructure, hosting, cybersecurity, and custom development services.
- Industry
- IT Consulting & ERP/Digital Transformation Services
Attack summary
Severity: high — Data has been published (confirmed exfiltration), and the company handles sensitive business data for clients across regulated industries including transportation infrastructure (Basque Rail), pharmaceuticals, and aerospace. The IT consulting context means third-party client data is likely at risk, amplifying impact beyond the victim company itself.LockBit 5 claims to have attacked Oreka IT, with the disclosure status recorded as 'data_published', indicating data has been exfiltrated and published. The leak post references the company's work with Euskal Trenbide Sarea (Basque Rail network), suggesting sensitive infrastructure-related data may be among the exposed materials.
Data the group says was taken
AI dossier — extracted from the leak post- Client project data
- ERP/SAP configuration and implementation files
- Business intelligence and analytics data
- HR and payroll data (given SAP HCM services)
- Infrastructure and network documentation
- Potential Basque Rail (ETS) related data
What the group claims
Oreka IT is a technology services company that works closely with Euskal Trenbide Sarea (Basque Rail...
Sources
Source
Indexed 20 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
