Ransomware victim disclosure
← All victimsActionAid / TACOSA
Claimed by medusalocker · listed 15 days ago
Status timeline
- Listed
May 5, 2026
- Data leaked
At a glance
- Group
- medusalocker
- Status
- Data leaked
- Country
- GB
- Sector
- Public Sector
- Listed on leak site
- May 5, 2026
About the victim
AI dossier — public-source company profileActionAid International is a global federation operating in over 40 countries across Africa, Asia, Europe, and the Americas, working to end poverty and injustice with a particular focus on women's rights, land and climate, politics and economics, and emergency response. TACOSA (tacosa.org.za) appears to be an affiliated South African entity, and the post also references immigration.go.tz, a Tanzanian government domain. The federation employs teams worldwide and runs campaigns, advocacy, and direct humanitarian programming.
- Industry
- International Non-Governmental Organisation (NGO) / Humanitarian Aid
- Address
- Vereniging ActionAid International, registered in Netherlands (RSIN: 813342211, Reg: 27264198); global federation headquartered internationally with UK presence
Attack summary
Severity: critical — The attack spans an international NGO, a South African affiliate, and a Tanzanian government immigration portal (immigration.go.tz), the latter of which is a government/public-sector system likely containing PII and immigration records at scale. Data is confirmed published, constituting exfiltration of potentially regulated government and beneficiary personal data across multiple jurisdictions.MedusaLocker claims to have compromised ActionAid and affiliated domains (actionaid.org, tacosa.org.za, immigration.go.tz), with the disclosure status recorded as data_published, indicating exfiltration and publication of data rather than encryption alone.
Data the group says was taken
AI dossier — extracted from the leak post- Organisational data from actionaid.org
- Data from TACOSA (tacosa.org.za)
- Data from Tanzanian immigration portal (immigration.go.tz)
What the group claims
NGO sector. Domains: actionaid.org, tacosa.org.za, immigration.go.tz.
The leak post
captured from the group's siteFile Manager File Manager home page BARAAAI Data is being prepared for publication. BAPAMAI Data is being prepared for publication. BAUARAI Data is being prepared for publication. BAVADAI Data is being prepared for publication. BAVACAI Data is being prepared for publication. BAVAQAI Data is being prepared for publication. Raycolighting DEMO 3137 S Alameda Street, Los Angeles, CA 90058, USA $10 000 Organization with 2 emails extracted. Domain: raycolighting.com baralai Data is being prepared for publication. CEAGESP / Netfeirasp DEMO São Paulo, Brazil $20 000 Brazilian produce wholesale market network. Domain netfeirasp.ceagesp (CEAGESP). Also demarchibrasil.com.br accounts. Colegio María Inmaculada (CMI) DEMO Moravia, San José, Costa Rica $50000 Catholic school in Moravia, Costa Rica. Domain cmi.local / mariainmaculada.ed.cr. Servers: CMI-DC01, CMI-APP, CMI-HTTP2, main-server1/2. Académie de Montpellier / CSJM DEMO Béziers, Occitanie, France $15000 French public school network. Domain CSJM.BEZIERS, part of Académie de Montpellier (ac-montpellier.fr). Occitanie region (laregion.fr). Teacher and admin staff credentials. Palmers Relocations DEMO Victoria, Australia $63 000 Australian …
Sources
Source
Indexed 15 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
