Ransomware victim disclosure
← All victimsshinyoko-porno.com
Claimed by Cryp70N1C0D3 · listed 4 years ago
Status timeline
- Listed
Dec 18, 2021
- Data leaked
At a glance
- Group
- Cryp70N1C0D3
- Status
- Data leaked
- Country
- Japan
- Sector
- Media & Entertainment
- Listed on leak site
- Dec 18, 2021
About the victim
AI dossier — public-source company profileShinyoko-porno.com operates a store-front-less (dispatch-type) adult massage and escort service based near Shin-Yokohama Station in Yokohama, Kanagawa Prefecture, Japan. The business sends staff to client locations such as business hotels. It is registered under Japan's revised Entertainment Business Act (新風営法届出済).
- Industry
- Adult Entertainment Services (Mobile Escort / Massage)
- Address
- Shin-Yokohama area, Yokohama, Kanagawa Prefecture, Japan
Attack summary
Severity: low — No leak post content was captured, no data volume or type is described, and no proof files or ransom are documented; only a listing exists with a data_published status.The group Cryp70N1C0D3 has listed the site under 'data_published' status, indicating data has been released; however, no leak post content, ransom demand, or description of exfiltrated or encrypted data was captured.
Sources
- Victim siteshinyoko-porno.com
Source
Indexed 4 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
