Ransomware victim disclosure
← All victimsWas Madeiras
Claimed by vect · listed 3 months ago
Status timeline
- Listed
Feb 24, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileWAS Madeiras is a Brazilian manufacturer of wooden packaging products including pallets, crates, and wooden boxes, operating since 1993 with over 30 years of market experience. The company operates four industrial units in Araucária (HQ), Minas, Quitandinha, and Telêmaco Borba, offering wood processing, assembly, and phytosanitary treatment services. It serves approximately 3,700 clients across 4,048 cities.
- Industry
- Wood Packaging & Pallet Manufacturing
- Address
- Rua José Cheifert, 160, PAV 02, Barigui, Araucária, PR, Brazil
- Founded
- 1993
Attack summary
Severity: high — 151 GB of confirmed exfiltrated operational business data covering production, logistics, and multi-plant scheduling has been fully published, representing significant exposure of proprietary manufacturing and supply chain information.The group 'vect' claims to have exfiltrated 151 GB of data from WAS Madeiras, publishing it in full. The disclosed data includes production control records, daily production logs, manufacturing scheduling data across multiple plants, assembly and mounting control records, shipping and expedition records, and warehouse data.
Data the group says was taken
AI dossier — extracted from the leak post- Production control records
- Daily production logs
- Manufacturing scheduling data (multiple plants)
- Assembly and mounting control records
- Shipping and expedition records
- Warehouse records
What the group claims
Status: STATUS: LEAKED | Sector: Manifacturer | Production control records Daily production logs Manufacturing scheduling data (multiple plants) Assembly and mounting control records Shipping and expedition records Warehous... DATA SIZE: 151GB
Sources
- Victim sitewasmadeiras.com.br
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
