Ransomware victim disclosure
← All victimshamyari Shahrdari golestan
Claimed by Arvinclub · listed 3 years ago
Status timeline
- Listed
Aug 3, 2023
- Data leaked
At a glance
- Group
- Arvinclub
- Status
- Data leaked
- Country
- Iran
- Sector
- Government
- Listed on leak site
- Aug 3, 2023
About the victim
AI dossier — public-source company profileHamyari Shahrdari Golestan (شرکت همیاری شهرداریهای گلستان) is an organization affiliated with the municipalities of Golestan Province, Iran. It provides cooperative support and administrative services to municipal governments across the province. The organization operates under the broader Iranian municipal governance framework.
- Industry
- Municipal Government Support Services
- Address
- Golestan Province, Iran
Attack summary
Severity: high — The target is a government-affiliated municipal organization in Iran; the status is data_published, indicating confirmed exfiltration and public release of potentially sensitive government and citizen-related records, even though exact data volume is unknown.The Arvinclub ransomware group claims to have attacked Hamyari Shahrdari Golestan and has published data (disclosed_status: data_published), though specific details on encryption or exfiltration scope are not available from the captured post.
Data the group says was taken
AI dossier — extracted from the leak post- Government administrative records
- Municipal personnel data
- Financial/budgetary documents
- Internal correspondence
Sources
- Victim sitehamyarigolestan.ir
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
