Ransomware victim disclosure
← All victimspanaya
Claimed by Cuba · listed 3 years ago
Status timeline
- Listed
Nov 7, 2023
- Data leaked
At a glance
- Group
- Cuba
- Status
- Data leaked
- Country
- Israel
- Sector
- Technology
- Listed on leak site
- Nov 7, 2023
About the victim
AI dossier — public-source company profilePanaya is an Israeli technology company that provides a Change Intelligence Platform for ERP and CRM applications, including SAP, Oracle EBS, Salesforce, and Workday. The platform combines change impact analysis, test management, and test automation to reduce the time, cost, and risk of changes to enterprise business applications. Panaya serves over 3,500 enterprise brands globally across industries such as retail, finance, manufacturing, and pharmaceuticals.
- Industry
- Enterprise Software Testing & Change Intelligence
- Employees
- 201-500
Attack summary
Severity: high — Data has been confirmed published (data_published status) by Cuba ransomware group against a SaaS/enterprise software company with 3,500+ enterprise clients; exfiltrated internal files from an ERP/CRM platform vendor could expose sensitive client integration data and intellectual property, constituting significant business data exfiltration.The Cuba ransomware group claims to have exfiltrated files from Panaya, publishing the data with a stated receipt date in the post. The disclosure status is marked as data_published, indicating stolen files have been made available.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate files
- Internal business documents
What the group claims
About PANAYAPanaya’s Change Intelligence solutions reduce the time, cost, and risk involved in change to business applications like SAP®, Oracle® EBS, and Salesforce.com. Date the files were received: 02...
Sources
- Victim sitepanaya.com
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
