Ransomware victim disclosure
← All victimsAxcera
listed as AXCERA.IO · Claimed by lapsus$ · listed 2 months ago
Status timeline
- Listed
Apr 5, 2026
- Data leaked
At a glance
- Group
- lapsus$
- Status
- Data leaked
- Country
- US
- Sector
- Technology
- Listed on leak site
- Apr 5, 2026
About the victim
AI dossier — public-source company profileAxcera (axcera.io) is a US-based FinTech company providing unified CRM and trading infrastructure solutions for proprietary trading firms and brokers. Its platform covers challenge management, automated payouts, real-time risk monitoring, KYC/AML compliance, trading APIs, and analytics. The company reports serving 50+ prop firms worldwide, with over 1 million unique traders onboarded and $450M+ in total partner revenue.
- Industry
- Proprietary Trading & Brokerage Technology (FinTech)
Attack summary
Severity: high — Published exfiltration of proprietary source code and infrastructure configs from a FinTech platform serving 50+ prop firms and 1M+ traders represents significant business and supply-chain risk; infrastructure configs may expose credentials, API keys, and internal architecture enabling further compromise of downstream clients.Lapsus$ claims to have exfiltrated Axcera's source code and infrastructure configuration files, with the disclosure status marked as data_published, indicating the stolen material has been released publicly.
Data the group says was taken
AI dossier — extracted from the leak post- Source code
- Infrastructure configuration files
What the group claims
Source Code + Infrastructure Configs
Sources
- Victim siteAXCERA.IO
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
