Ransomware victim disclosure
← All victimsSETCAR
Claimed by thegentlemen · listed 8 days ago
Status timeline
- Listed
May 12, 2026
- Data leaked
At a glance
- Group
- thegentlemen
- Status
- Data leaked
- Country
- TN
- Sector
- Transportation/Logistics
- Listed on leak site
- May 12, 2026
About the victim
AI dossier — public-source company profileSETCAR is a Tunisian private manufacturer of buses, coaches, and minibuses, founded in 1976 and headquartered in Tunisia. The company partners with global brands such as Volvo and Iveco, producing up to 500 vehicles annually. It serves public transport, tourism, and institutional clients across Africa and the Middle East.
- Industry
- Bus & Coach Manufacturing
- Address
- Tunisia
- Employees
- 300
- Founded
- 1976
Attack summary
Severity: medium — Data has been published (confirmed exfiltration) but no specific sensitive regulated data categories (PII at scale, medical, financial) are identified in the post, and no data volume is stated, limiting severity to medium.The group 'thegentlemen' claims to have conducted an attack on SETCAR with data published, indicating exfiltration of company data. No specific data volume or encryption claim is detailed in the post, but the disclosed status confirms data has been published.
Data the group says was taken
AI dossier — extracted from the leak post- Company operational data
- Business/client records
What the group claims
setcar.com.tn zoominfo.com/c/setcar/507355731 SETCAR is Tunisia's pioneering private manufacturer of buses, coaches, and minibuses, with over 50 years of excellence since 1976. Partnering with global leaders like Volvo and Iveco, they produce up to 500 vehicles annually, serving public transport, tourism, and institutional clients across Africa and the Middle East. With a 300-strong expert team, advanced production facilities, and dedicated after-sales support, SETCAR delivers innovative, eco-friendly mobility solutions built for reliability and performance
Sources
- Victim sitesetcar.com.tn
Source
Indexed 8 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
