Ransomware victim disclosure
← All victimsNTT Docomo
Claimed by Ransomedvc · listed 3 years ago
Status timeline
- Listed
Oct 6, 2023
- Data leaked
At a glance
- Group
- Ransomedvc
- Status
- Data leaked
- Country
- Japan
- Sector
- Telecommunications
- Listed on leak site
- Oct 6, 2023
- Records
- 310.000 employees
About the victim
AI dossier — public-source company profileNTT Docomo is a major telecommunications carrier operating under NTT (Nippon Telegraph and Telephone Corporation), one of the world's largest telecom groups with approximately 310,000 employees worldwide. The company provides a wide range of telecommunications services primarily in Japan and is part of a group trusted by 88% of Fortune 500 top-100 companies. NTT Docomo is a leading mobile and digital services provider in the Japanese market.
- Industry
- Telecommunications
- Employees
- 310000
Attack summary
Severity: high — NTT Docomo is a critical telecommunications infrastructure provider serving tens of millions of users in Japan; data_published status indicates confirmed exfiltration rather than a mere listing, and the scale of the organisation means any confirmed breach carries significant impact, though the specific nature and volume of published data is not detailed in the post.RansomedVC claims to have compromised NTT Docomo and has published data ('data_published' status), asserting access to company information. The leak post does not specify the volume of exfiltrated data or whether encryption was also performed.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate business data
- Internal company information
What the group claims
With approximately 310,000 employees worldwide, NTT (Nippon Telegraph and Telephone Corporation) is one of the world’s leading telecommunications carriers. It is chosen by as many as 88% of the top 100 companies in the Fortune Global Business Ranking “Fortune 500”, an annual U.S. business magazine. We offer a wide range of services in Japan, from…
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
