Ransomware victim disclosure
← All victimsatolon-parkhotel
Claimed by stormous · listed 19 days ago
Status timeline
- Listed
May 2, 2026
- Data leaked
At a glance
- Group
- stormous
- Status
- Data leaked
- Country
- DE
- Sector
- Hospitality and Tourism
- Listed on leak site
- May 2, 2026
About the victim
AI dossier — public-source company profileAtolon Parkhotel is a hotel property located in Germany, operating within the hospitality and tourism sector. Based on the leak post references to reservations, personnel records, and trainee data, it appears to be a mid-sized hotel operation. No public website content was available to confirm further details.
- Industry
- Hospitality & Hotel Management
Attack summary
Severity: high — Data has been published (disclosed status: data_published) and includes personally identifiable information such as CVs, personnel records, trainee data, and financial invoices. The combination of PII for employees and guests/applicants alongside financial records constitutes significant sensitive data exposure warranting a high severity rating.The Stormous ransomware group claims to have exfiltrated data from Atolon Parkhotel, with data described as published. The stolen data allegedly includes CVs, invoices, reservation records, personnel information, and trainee records.
Data the group says was taken
AI dossier — extracted from the leak post- CVs / resumes
- Invoices (FACTURES)
- Reservation records (2025)
- Personnel records
- Employee/staff information
- Trainee (intern) records
- AA GROUPE 2025 documents
- Huawei.com-related files
What the group claims
CVs - FACTURES - Hwawei.com - AA GROUPE 2025 - RESERVATION 2025 - PERSONNELS - INFOS - STAGIAIRES.....
Source
Indexed 19 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
