Ransomware victim disclosure
← All victimsMinistry of Internal Affairs of Ukraine (МВС України)
listed as wanted.mvs.gov.ua · Claimed by Freecivilian · listed 3 years ago
Status timeline
- Listed
Dec 31, 2022
- Data leaked
At a glance
- Group
- Freecivilian
- Status
- Data leaked
- Country
- Ukraine
- Sector
- Government
- Listed on leak site
- Dec 31, 2022
About the victim
AI dossier — public-source company profileThe Ministry of Internal Affairs of Ukraine (MVS) is the central executive body responsible for state policy on law enforcement, public order, border protection, and civil protection across Ukraine. It oversees the National Police, National Guard, State Border Guard Service, and other security agencies. The ministry operates nationwide and is a core component of Ukraine's national security apparatus.
- Industry
- Federal / National Law Enforcement & Internal Security
- Address
- Академіка Богомольця, 10, Київ, 01601, Ukraine
- Founded
- 1991
Attack summary
Severity: critical — The target is a national government law enforcement ministry; the compromised subdomain relates to wanted-persons records, which constitutes sensitive PII at scale intertwined with active law enforcement operations. Published data from a national security agency during an active conflict context elevates severity to critical.The Freecivilian group claims to have exfiltrated data from the Ukrainian Ministry of Internal Affairs' wanted-persons subdomain (wanted.mvs.gov.ua); the status is listed as data_published, indicating stolen data has been released publicly. No ransom demand was stated.
Data the group says was taken
AI dossier — extracted from the leak post- Wanted-persons database records
- Personal identification data of suspects/fugitives
- Law enforcement operational records
- Potentially internal government user credentials
Sources
- Victim sitemvs.gov
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
