Ransomware victim disclosure
← All victimsACTi Corporation
listed as ACTi.com · Claimed by Embargo · listed 7 months ago
Status timeline
- Listed
Oct 22, 2025
- Data leaked
At a glance
- Group
- Embargo
- Status
- Data leaked
- Country
- Taiwan
- Sector
- Technology
- Listed on leak site
- Oct 22, 2025
- Data size
- 1.5 TB
About the victim
AI dossier — public-source company profileACTi Corporation, founded in 2003 and headquartered in Taiwan, is a technology company specializing in Big Data, Robotics, IoT, Cloud, and AI technologies. The company develops intelligent business solutions and is known particularly for its network video surveillance products and platforms. It operates as a significant player in the IP camera and smart security ecosystem.
- Industry
- Video Surveillance & IoT Technology
- Founded
- 2003
Attack summary
Severity: high — Over 1.5 TB of data has been confirmed exfiltrated and published by the threat actor. ACTi is a technology/IoT/AI company whose leaked data could include proprietary source code, customer records, and sensitive business information at significant scale, warranting a high severity rating. Insufficient evidence of regulated PII at scale to escalate to critical.The Embargo ransomware group claims to have exfiltrated more than 1.5 TB of data from ACTi Corporation, with the disclosure status indicating the data has been published. No ransom amount was stated.
Data the group says was taken
AI dossier — extracted from the leak post- Exfiltrated corporate data (1.5 TB)
- Potentially proprietary technology and R&D files
- Potentially business operational records
What the group claims
ACTi Corporation, founded in 2003, is a leading application developer with Big Data, Robot, IoT, Cloud and AI Technologies to empower business intelligent solut... - more than 1.5TB of data has been downloaded.
Sources
Source
Indexed 7 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
