Ransomware victim disclosure
← All victimsUniversal Asset Management
listed as UAM · Claimed by datacarry · listed 6 months ago
Status timeline
- Listed
Nov 21, 2025
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileUniversal Asset Management (UAM) is a global aviation services company headquartered in Tennessee, USA, founded in 1992. The company specialises in whole asset management encompassing aircraft leasing, trading, and dismantling of end-of-life commercial aircraft. UAM serves a wide range of clients worldwide and emphasises environmental sustainability through recycling of aircraft materials.
- Industry
- Aviation Asset Management & Aircraft Leasing
- Address
- Tennessee, USA
- Founded
- 1992
Attack summary
Severity: high — Data has been confirmed as published by the threat actor, indicating successful exfiltration from a global aviation asset management firm. The sector involves significant commercial and financial data, and confirmed data publication elevates severity beyond medium even without explicit enumeration of file types.The datacarry ransomware group claims to have attacked UAM and has published data ('data_published' status), indicating confirmed exfiltration of company data; the specific volume and nature of exfiltrated files are not detailed in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate business records
- Aircraft asset management data
- Client/customer information
- Financial records
Original description
AI-summarised, not from the leak postUAM, officially known as Universal Asset Management, is a global leader in the aviation services industry. They specialize in whole asset management, from leasing, trading to dismantling end-of-life commercial aircraft. Established in 1992 and headquartered in Tennessee, USA, UAM utilizes advanced technology to serve a wide range of clients around the world. They are dedicated to environmental sustainability through recycling aircraft materials.
Source
Indexed 6 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
