Ransomware victim disclosure
← All victimsKyiv City State Administration
listed as kyivcity.com · Claimed by Freecivilian · listed 3 years ago
Status timeline
- Listed
Dec 31, 2022
- Data leaked
At a glance
- Group
- Freecivilian
- Status
- Data leaked
- Country
- Ukraine
- Sector
- Education
- Listed on leak site
- Dec 31, 2022
About the victim
AI dossier — public-source company profilekyivcity.com is associated with the Kyiv City State Administration, the executive body governing the city of Kyiv, Ukraine. It oversees municipal services, urban planning, public infrastructure, and local government functions for one of Eastern Europe's largest capital cities. The domain serves as an official or quasi-official web presence for city government information and services.
- Industry
- Municipal Government Administration
- Address
- Хрещатик вул., 36, Київ, Ukraine, 01044
Attack summary
Severity: critical — The target is a national capital city government administration during an active wartime conflict; exfiltration of government data from Kyiv municipal systems represents a critical exposure of public-sector records that may include citizen PII, sensitive administrative and infrastructure data, and operationally sensitive government information.The Freecivilian ransomware group claims to have attacked kyivcity.com and has published data ('data_published' status), suggesting exfiltration of government records; no ransom amount or specific data volume was stated in the available post.
Data the group says was taken
AI dossier — extracted from the leak post- Municipal government records
- City administration documents
- Potentially citizen-related data
- Internal administrative communications
Sources
- Victim sitekyivcity.com
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
