Ransomware victim disclosure
← All victimsjacksoncountyin.com
Claimed by lynx · listed 11 days ago
Status timeline
- Listed
May 10, 2026
- Data leaked
At a glance
- Group
- lynx
- Status
- Data leaked
- Country
- US
- Sector
- Public Sector
- Listed on leak site
- May 10, 2026
About the victim
AI dossier — public-source company profileThe Jackson County Visitor Center is a public-sector tourism and travel resource located in Jackson County, Indiana. It promotes local outdoor recreation, cultural experiences, dining, and community festivals to travelers and residents. It serves as a regional gateway for Southern Indiana tourism planning.
- Industry
- Tourism & Visitor Services (Public Sector)
Attack summary
Severity: medium — Data has been published by the group, indicating confirmed exfiltration and disclosure, but no details on the volume, type, or sensitivity of the data are provided, and no evidence of PII at scale, financial, or regulated data is stated.The Lynx ransomware group claims to have attacked the Jackson County Visitor Center and has published data ('data_published' status), though no specific data size or ransom demand was stated in the post.
What the group claims
Jackson County Visitor Center serves as a gateway for travelers seeking to explore the scenic beauty, rich history, and vibrant community of Jackson County, Indiana. The center offers a variety of outdoor recreational activities, cultural experiences, and local events, catering to families, adventure seekers, and history enthusiasts alike. Visitors can enjoy hiking, biking, local dining, and numerous festivals that celebrate the region's heritage and community spirit. Conveniently located near major cities, the center is an ideal resource for planning memorable getaways and discovering hidden gems in Southern Indiana.
Sources
Source
Indexed 11 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
