Ransomware victim disclosure
← All victimsG-Able Public Company Limited
listed as g-able.com · Claimed by Blackmatter · listed 5 years ago
Status timeline
- Listed
Sep 9, 2021
- Data leaked
At a glance
- Group
- Blackmatter
- Status
- Data leaked
- Country
- Thailand
- Sector
- Technology
- Listed on leak site
- Sep 9, 2021
About the victim
AI dossier — public-source company profileG-Able Public Company Limited (g-able.com) is a Thailand-based technology company with over 36 years of experience providing enterprise digital solutions, including cybersecurity, cloud and data center modernization, data analytics, digital business applications, and managed tech services. The company partners with over 100 global technology vendors including AWS, Dell, Oracle, Huawei, and Microsoft, and serves more than 1,000 clients across diverse industries such as finance, retail, healthcare, telecommunications, and education. It is publicly listed and operates primarily in the Thai market.
- Industry
- IT Solutions & Digital Technology Services
- Employees
- 1000+
- Founded
- 1989
Attack summary
Severity: high — The disclosure status is 'data_published', confirming that data has been exfiltrated and released by the threat actor. G-Able is an IT solutions and cybersecurity provider serving 1,000+ enterprise clients across sensitive sectors (finance, healthcare, government-adjacent), meaning leaked internal data could include client credentials, infrastructure details, or sensitive enterprise information, representing significant business and third-party risk.The BlackMatter ransomware group claims to have attacked G-Able and the disclosure status is listed as data_published, indicating that exfiltrated data has been published. No specific details about the volume or nature of the exfiltrated data are available from the captured leak post.
Data the group says was taken
AI dossier — extracted from the leak post- Published exfiltrated company data (specifics not captured)
Sources
- Victim siteg-able.com
Source
Indexed 5 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
