Ransomware victim disclosure
← All victimsVSP Solutions
listed as vspsolutions.com.au SAMPLE-FREE 20GB · Claimed by stormous · listed 7 days ago
Status timeline
- Listed
May 13, 2026
- Data leaked
At a glance
- Group
- stormous
- Status
- Data leaked
- Country
- AU
- Sector
- Business Services
- Listed on leak site
- May 13, 2026
About the victim
AI dossier — public-source company profileVSP Solutions (vspsolutions.com.au) is an Australian business operating in the security and surveillance technology sector, distributing and supplying products from major brands such as Hikvision and Axis to installers and integrators nationwide. The company manages shipment and order tracking for its customer base and maintains financial records via accounting platforms Quickbooks and Reckon.
- Industry
- Security & Surveillance Technology Distribution
Attack summary
Severity: high — Confirmed exfiltration and publication of significant business data including full financial backups, staff personal data, and nationwide customer/client databases; while not explicitly medical or government data, the scale and variety of sensitive business and personal records — combined with confirmed data_published status — warrants a high severity rating.Stormous claims to have exfiltrated over 40GB of data including full financial backups, email archives, staff personal folders, customer/client databases, and shipment and order tracking records; the post indicates data has been published with a sample-free notice.
Data the group says was taken
AI dossier — extracted from the leak post- Full financial backups (Quickbooks & Reckon)
- Email archives
- Staff personal folders
- Customer/client databases
- Installer and integrator contact records
- Shipment and order tracking records
What the group claims
+40G Full Financial Backups (Quickbooks & Reckon)-Email Archives & Staff Personal Folders-Customer/Client Databases (Installers & Integrators nationwide)-Shipment & Order Tracking for major brands like Hikvision & Axis.
Source
Indexed 7 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
