Ransomware victim disclosure
← All victimsarc-reins.com + fidelityunited.ae
Claimed by stormous · listed 19 days ago
Status timeline
- Listed
May 2, 2026
- Data leaked
At a glance
- Group
- stormous
- Status
- Data leaked
- Country
- AE
- Sector
- Financial Services
- Listed on leak site
- May 2, 2026
About the victim
AI dossier — public-source company profileFidelity United (fidelityunited.ae) is a UAE-based insurance company that commenced operations in 1976, resulting from a 2017 partnership between United Insurance Company and Fidelity Assurance and Reassurance SAL, rebranded in 2018. It operates 5 offices across the UAE, serving over 285,000 individuals, and offers a broad range of insurance products including motor, health, marine, property, liability, and life insurance for both personal and corporate clients. ARC (arc-reins.com) appears to be an associated reinsurance or insurance brokerage entity whose data was also compromised in the same breach.
- Industry
- Insurance & Financial Services (UAE)
- Address
- UAE (5 offices in the UAE; specific street address not stated in available data)
- Founded
- 1976
Attack summary
Severity: critical — Confirmed exfiltration and publication of 700 GB of regulated financial and insurance data including KYC files, passports, national IDs, bank details, passwords, and thousands of personal records across clients, partners, and employees — constituting large-scale PII and regulated financial data exposure in the financial services sector.Stormous claims to have exfiltrated approximately 700 GB (also described as 600 GB) of data from Fidelity United and ARC, with data already published; no encryption claim is made. The exfiltrated data allegedly includes KYC records, bank details, compliance audit data, employee PII (passports, ID cards), insurance deal archives, client lists, and internal credentials.
Data the group says was taken
AI dossier — extracted from the leak post- KYC and KYC TOBA files for all partners
- Complete bank details for ARC
- Compliance audit data
- Legal licenses and tax documents
- Official contracts
- Employee passports and ID cards
- Employee personal data and career details
- Manager contracts and internal communications
- Marine insurance deal archive (Middle East)
- Property, civil liability, and risk insurance records
- Monthly and annual quality control reports
- Collective agreements with international partners
- Business travel logs
- Passwords and DC client lists
- Digital identities and official company signatures
- Major client lists
- Thousands of personal records for Fidelity and ARC brokers
What the group claims
We have gained full control over 700 GB of data, which includes: meticulous compliance audit data, complete Bank details for ARC, legal licenses, tax documents, and official contracts, as well as KYC and KYC TOBA files for all partners.Additionally, personal data for all employees has been extracted, including passports, ID cards, emails, career details, personal documents, and contracts for managers and internal communications. The breach also covers the marine insurance archive with all its deals in the Middle East, property insurance, civil liability, and risk insurance, in addition to monthly and annual quality control reports and collective agreements with major international partners.We have full control over administrative data, business travel logs, passwords, and DC client lists, along with all internal correspondence, digital identities, and official company signatures. The data also includes a list of major clients and thousands of personal information records for Fidelity and ARC brokers, including their full personal details. All of this and more, totaling 600 GB of secrets.
Sources
- Victim sitefidelityunited.ae
Source
Indexed 19 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
