Ransomware victim disclosure
← All victimsMartec Marine
listed as martec.it · Claimed by tengu · listed 3 months ago
Status timeline
- Listed
Feb 25, 2026
- Data leaked
At a glance
- Group
- tengu
- Status
- Data leaked
- Country
- Italy
- Sector
- Technology
- Listed on leak site
- Feb 25, 2026
About the victim
AI dossier — public-source company profileMartec Marine is an Italian privately owned company, active since 1994, specializing in defense and integrated safety solutions for Navy vessels, cruise ships, and mega yachts. The company designs and develops damage control systems, fire detection systems, emergency shutdown systems, and related software packages. More than 12 Navy ships and over 80 cruise liners and mega yachts have Martec Damage Control Systems installed.
- Industry
- Defense & Marine Safety Systems
- Founded
- 1994
Attack summary
Severity: critical — Martec Marine operates in the defense sector, supplying safety and damage control systems to Navy ships, cruise liners, and mega yachts. Exfiltration and publication of data from a defense-adjacent maritime safety company carries significant national security and operational risk, qualifying as critical under regulated/sensitive defense data exposure.The Tengu ransomware group claims to have published data exfiltrated from Martec Marine, with the disclosure status listed as 'data_published', indicating stolen data has been released. No specific data volume or encryption details are stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Defense and safety system design data
- Naval and maritime client records
- Software package documentation
- Corporate business data
What the group claims
MARTEC MARINE is part of an Italian privately owned Group active in the Defense and Integrated Safety solutions for Navy, Cruise ships and Mega Yachts since 1994.From the early beginning of its activities Martec has deeply invested in the design and development of safety systems, being awarded, at present, as one of the most skilled companies in an international context, in this field.More than 12 Navy ships and more than 80 Cruise liners and Mega Yachts have Martec Damage Control Systems installed.Product range vary from hardware (Damage Control Systems, Electronic Incident Board, Fire Detection System, Emergency Shutdown System, Automatic Fire Sensing and Suppression System) to software packages (Damage Control, Decision Support, On Board Stability, Personnel Tracking, Security and Technical Patrol Management, Injured Treatment).Innovation, Integration and Flexibility are the key words for MARTEC: development of new solutions based on customer requirements, integration with third par
The leak post
captured from the group's siteShisa Ransomware Blog Shisa RANSOMWARE DATA LEAKS BLOG HOME AFFILIATE PROGRAM CONTACT crown-security.com.tw PUBLISHED Crown Security is a technology company specializing in information security and digital systems, offering advanced solutions to protect corporate networks and data from breaches and cyberattacks The company focuses on providing security consulting and implementing integrated protection systems tailored to each organization's needs 27,470 👁 Sileno Companies Inc PUBLISHED Sileno Companies Inc. A US company primarily operating in the hospitality and real estate sectors, its activities include: Hotel operation Property management Management of hotels' restaurants and bars Hospitality project development 22.9TB was encrypted in 14 hours on 3/5/2026 More than 67.07 GB was extracted 29,787 👁 Eos Technology srl PUBLISHED Eos Technology srl is a company with 15 years of experience in the ICT sector, initially starting as an assembly and repair laboratory for PCs and peripherals. Over time, it has developed expertise that has allowed it to become a partner of various international brands. The company offers a range of services including IT assistance, multimedia services, h…
Sources
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
