Ransomware victim disclosure
← All victimsJBCC Holdings Corporation
listed as JBCC Corp · Claimed by Mallox · listed 3 years ago
Status timeline
- Listed
Jun 28, 2023
- Data leaked
At a glance
- Group
- Mallox
- Status
- Data leaked
- Country
- United States
- Sector
- Technology
- Listed on leak site
- Jun 28, 2023
About the victim
AI dossier — public-source company profileJBCC Holdings Corporation is a Japanese IT services company headquartered in Tokyo, specialising in systems integration, cloud services, network infrastructure, and IT outsourcing. The company serves a wide range of enterprise clients across Japan and has multiple subsidiaries operating in the IT solutions space. Its clearnet domain jbcc.co.jp confirms its Japanese operations, despite the threat actor listing the country as United States.
- Industry
- IT Services & Systems Integration
- Address
- 1-7-1 Yokoami, Sumida-ku, Tokyo 130-0015, Japan
- Employees
- 1001-5000
- Founded
- 1966
Attack summary
Severity: high — Data has been confirmed as published (four exfiltrated archive parts released publicly), indicating successful exfiltration of internal company data from a mid-to-large IT services firm; the exact data contents are unverified but the scale and publication status elevate severity to high.The Mallox ransomware group claims to have exfiltrated data from JBCC Corp, publishing four multi-part compressed archive files (CISDOM.7z.001–.004) with a shared password via AnonFiles, indicating confirmed data exfiltration and publication.
Data the group says was taken
AI dossier — extracted from the leak post- Compressed archive files (CISDOM.7z multi-part)
- Corporate/internal documents (contents unspecified)
- Potentially client or business records
The group's post references roughly 4 proof files.
What the group claims
INFO: https://www.zoominfo.com/c/jbcc/431568723 DATA: CISDOM.7z.004: https://anonfiles.com/3eH2a3zez6/CISDOM_7z_004 CISDOM.7z.003: https://anonfiles.com/KfH1a5z6ze/CISDOM_7z_003 CISDOM.7z.002: https://anonfiles.com/MfHca7zfzd/CISDOM_7z_002 CISDOM.7z.001: https://anonfiles.com/FeH5aaz7z5/CISDOM_7z_001 Password: &q.&i_R327:3p1<dBtEK~L02HT(4C3JZ
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
