Ransomware victim disclosure
← All victimsChestertons Inc.
Claimed by Lorenz · listed 3 years ago
Status timeline
- Listed
Jan 10, 2023
- Data leaked
At a glance
- Group
- Lorenz
- Status
- Data leaked
- Country
- United States
- Sector
- Real Estate
- Listed on leak site
- Jan 10, 2023
About the victim
AI dossier — public-source company profileChestertons is a global real estate network offering property sales, lettings, valuation, management, and development services across multiple continents including Africa, Asia, the Caribbean, Europe, and North America. The firm specialises in luxury and high-end residential and commercial properties, operating offices in markets such as the UAE, UK, Gibraltar, Cyprus, Barbados, and numerous other countries. It positions itself as combining international reach with local market expertise.
- Industry
- International Luxury Real Estate Services
- Employees
- 201-500
Attack summary
Severity: high — Data is listed as published (data_published) by Lorenz, a group known for exfiltrating data before or instead of encrypting; a global luxury real estate firm would hold significant volumes of client PII, financial transaction records, property ownership data, and confidential business documents across multiple jurisdictions, making a confirmed publication high severity even without specific data inventory details.The Lorenz ransomware group claims to have attacked Chestertons Inc. and the disclosure status is listed as data_published, indicating data has been released; however, no specific claims regarding encryption, exfiltration volume, or data categories are captured in the available leak post.
Data the group says was taken
AI dossier — extracted from the leak post- Unknown — no leak post content captured
Sources
- Victim sitechestertons.com
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
