Ransomware victim disclosure
← All victimsAgostini Insurance Brokers
Claimed by Royal · listed 3 years ago
Status timeline
- Listed
May 22, 2023
- Data leaked
At a glance
- Group
- Royal
- Status
- Data leaked
- Country
- Trinidad and Tobago
- Sector
- Finance
- Listed on leak site
- May 22, 2023
- Data size
- 24 GB
About the victim
AI dossier — public-source company profileAgostini Insurance Brokers Limited is the longest-standing private-sector insurance brokerage firm in Trinidad and Tobago, incorporated on 29 December 1950 under the name Agostini Brothers Insurance Limited. The company provides tailored business and personal insurance solutions, including motor, home, and cyber insurance products, serving clients across Trinidad and Tobago. It operates as an independent broker, acting on behalf of clients rather than insurers.
- Industry
- Insurance Brokerage
- Address
- Trinidad and Tobago
- Founded
- 1950
Attack summary
Severity: critical — An insurance brokerage holds regulated financial and personal data (PII, policy details, claims information, payment data) at scale. Confirmed exfiltration of 24 GB with data published constitutes a critical breach of sensitive regulated data affecting both individual and business clients.The Royal ransomware group claims to have exfiltrated 24 GB of data from Agostini Insurance Brokers Limited and has published the data. No ransom amount was stated.
Data the group says was taken
AI dossier — extracted from the leak post- Client insurance records
- Business insurance documentation
- Personal insurance documentation
- Claims records
- Financial/payment data
- Employee/HR data
What the group claims
Agostini Insurance Brokers Limited is the longest standing private sector firm of Insurance Brokers within Trinidad and Tobago, having previously been incorporated in the name Agostini Brothers Insurance Limited on the 29th of December 1950.Total downloaded data - 24gb
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
