Ransomware victim disclosure
← All victimsH****o
Claimed by payoutsking · listed 21 days ago
Status timeline
- Listed
Apr 30, 2026
- Data leaked
At a glance
- Group
- payoutsking
- Status
- Data leaked
- Country
- US
- Sector
- Not Found
- Listed on leak site
- Apr 30, 2026
About the victim
AI dossier — public-source company profileThe victim is identified only by a partially redacted name beginning with 'H' and ending with 'o', with a clearnet domain beginning with 'has' under a .com TLD. Insufficient public information is available to describe the company's operations, location, or scale.
Attack summary
Severity: medium — Status is 'data_published', indicating data has been released publicly, which elevates severity above a mere listing; however, the absence of any post content, data size, sector information, or proof files prevents confirmation of sensitive or regulated data exposure.The group 'payoutsking' has listed this victim with a disclosed status of 'data_published', suggesting data has been exfiltrated and released; however, no leak post content or ransom details were captured to further characterise the attack.
Sources
- Victim sitehas****.com
Source
Indexed 21 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
