Ransomware victim disclosure
← All victimsUSA Military Alumni Networks
Claimed by bqtlock · listed 10 months ago
Status timeline
- Listed
Jul 31, 2025
- Data leaked
At a glance
- Group
- bqtlock
- Status
- Data leaked
- Country
- United States
- Sector
- Public Sector
- Listed on leak site
- Jul 31, 2025
About the victim
AI dossier — public-source company profileA network of US military alumni organizations operating multiple web properties and email services. The specific organizational structure and scale are unclear from available evidence, but the domain portfolio suggests coordination across several alumni networking platforms.
- Industry
- Public Sector - Military Alumni & Networking
Attack summary
Severity: high — Compromise of military alumni networks affects individuals with military service backgrounds; potential exposure of personal information, service records, and contact details of a sensitive population. Multiple domains compromised suggests operational scope. However, lack of explicit proof publication and unclear data exfiltration status prevents 'critical' classification.The bqtlock group claims to have compromised multiple domains associated with USA Military Alumni Networks, publishing a list of affected web properties and mail services. The nature of exfiltrated data and encryption status is not explicitly stated in the available post.
Data the group says was taken
AI dossier — extracted from the leak post- Email accounts and mail server data
- Military alumni records
- User account information
- Web platform data
What the group claims
isabrd.com, varsityo.com, letterwinner.com, whoglue.net, whoglue.com, whoware.com, mail.usna87.com
Sources
Source
Indexed 10 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
