Ransomware victim disclosure
← All victimsAlfara
listed as a*f***a · Claimed by vect · listed 3 months ago
Status timeline
- Listed
Feb 24, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileAlfara (inferred from domain pattern a*f***a.care) appears to be a healthcare provider operating within the European Union, based on the .care top-level domain and sector classification. The company likely offers patient-facing clinical or care services, though specific operational details are not publicly available from the provided data.
- Industry
- Healthcare Services
Attack summary
Severity: high — The victim operates in the healthcare sector, and the attackers claim exfiltration of client records, which likely includes patient PII and potentially medical data — regulated sensitive information. The data_published status elevates severity beyond medium even without a confirmed exact data volume.The group 'vect' claims to have compromised Alfara and is currently in negotiations, with exfiltration of client records and internal documents alleged. The disclosure status is listed as data_published, suggesting some proof or data has already been released.
Data the group says was taken
AI dossier — extracted from the leak post- Client records
- Internal documents
What the group claims
Status: STATUS: NEGOTIATING | Sector: Healthcare | client records, documents and so on | Deadline: 18d 19h
Sources
- Victim sitea*f***a.care
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
