Ransomware victim disclosure
← All victimsDINI
Claimed by CRY0 · listed 4 days ago
Status timeline
- Listed
May 17, 2026
Current state: Listed for ransom
At a glance
- Group
- CRY0
- Status
- Listed for ransom
- Listed on leak site
- May 17, 2026
About the victim
AI dossier — public-source company profileDINI is described as a family-run transportation and automotive business. Beyond this characterization from the leak post, no further details about its location, scale, or specific services are publicly available. The company's country of operation is currently unknown.
- Industry
- Transportation & Automotive Services
Attack summary
Severity: low — This is an initial listing only with no proof files, no stated ransom, no confirmed data exfiltration, no data volume, and no operational impact described. Minimal verifiable information is available.The CRY0 ransomware group has listed DINI on their leak blog, claiming an attack on the company. No specific details about encryption, exfiltration, data volume, or ransom demand have been disclosed in the available post excerpt.
What the group claims
A family-run transportation and automotive business
The leak post
captured from the group's sitecry0 Team Blog - Home This is a cry0 Team Blog. Select a post to read. DINI is a family-run transportation and automotive business base...
Screenshot of the leak post

Sources
Source
Indexed 4 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
