Ransomware victim disclosure
← All victimsScheppersinstituut Wetteren
Claimed by Vicesociety · listed 3 years ago
Status timeline
- Listed
Jan 30, 2023
- Data leaked
At a glance
- Group
- Vicesociety
- Status
- Data leaked
- Country
- Belgium
- Sector
- Education
- Listed on leak site
- Jan 30, 2023
About the victim
AI dossier — public-source company profileScheppersinstituut Wetteren is a Catholic secondary school located in Wetteren, Belgium, operated by the Friars of Scheppers and part of the Katholieke Scholengemeenschap Wetteren-Lede (KSGWL). The school offers a broad range of study programmes across all grades of secondary education, including technical and vocational tracks. It is one of six secondary schools run by the Friars of Scheppers in Flanders.
- Industry
- Secondary Education
- Address
- Cooppallaan 128, 9230 Wetteren, Belgium
Attack summary
Severity: high — Data has been confirmed published by the group; as a school, the victim likely holds minors' PII, staff personal data, and potentially sensitive educational records, constituting regulated personal data under GDPR with particular sensitivity given the involvement of minors.Vice Society claims to have attacked Scheppersinstituut Wetteren and has published data ('data_published' status), suggesting exfiltration of school data; no specific ransom amount or data volume was disclosed in the post.
Data the group says was taken
AI dossier — extracted from the leak post- School administrative records
- Student data
- Staff data
- Internal school documents
What the group claims
Scheppersinstituut Wetteren is a company that operates in the Education industry. The Scheppers Institute is one of the 6 schools for Secondary Education of the Friars of Scheppers in Flanders.
Sources
- Victim sitescheppers-wetteren.be/
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
