Ransomware victim disclosure
← All victimsbulentklise
Claimed by stormous · listed 19 days ago
Status timeline
- Listed
May 2, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileBulentklise appears to be a company involved in production and order management, based on references to production orders, delivery tracking, and client records in the leak post. No public website or additional verifiable information was available to confirm its sector, location, or scale. The name suggests a possible Turkish origin ('klise' is a Turkish word), but this cannot be confirmed.
Attack summary
Severity: high — Data has been confirmed published and includes personally identifiable information such as customer names and identification numbers alongside business-sensitive operational data (production orders, client records, delivery tracking), constituting significant exfiltration of both PII and business data.The Stormous ransomware group claims to have exfiltrated data from bulentklise, publishing customer names, identification numbers, production orders, client records, delivery tracking data, customer information, logos, and other files. The disclosure status is listed as data_published, indicating the stolen data has been released.
Data the group says was taken
AI dossier — extracted from the leak post- Customer names
- Identification numbers
- Production orders
- Client records
- Delivery tracking data
- Customer information
- Logos
What the group claims
Customer names, identification numbers, production orders, client records, delivery tracking data, customer information, logos, and more
Source
Indexed 19 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
