Ransomware victim disclosure
← All victimsBuenos Aires Software
Claimed by coinbasecartel · listed 8 days ago
Status timeline
- Listed
May 13, 2026
- Data leaked
At a glance
- Group
- coinbasecartel
- Status
- Data leaked
- Country
- AR
- Sector
- Technology
- Listed on leak site
- May 13, 2026
About the victim
AI dossier — public-source company profileBuenos Aires Software (BAS) is an Argentine software company that develops and sells business management systems including ERP, HR, payroll, point-of-sale, and accounting solutions for SMEs and enterprise clients. Their products are marketed under two lines: Línea Enterprise and Línea Easy Soft. The company reports over 6,500 client companies across various industries in Argentina.
- Industry
- Business Management Software (ERP & SME Solutions)
- Address
- Buenos Aires, Argentina
Attack summary
Severity: medium — Data is listed as published, indicating confirmed exfiltration and disclosure. However, no specific data types, volume, or sensitivity level (e.g., PII, financial, regulated) are stated or evidenced, and the leak post content was unavailable for assessment, limiting severity to medium.The group 'coinbasecartel' claims to have published data belonging to Buenos Aires Software; the status is listed as 'data_published', indicating exfiltration and public disclosure of company data. No specific ransom amount or data volume was stated, and the leak post content was not available.
Original description
AI-summarised, not from the leak postN/A
The leak post
captured from the group's siteSystem Breach • Coinbasecartel We are looking for new partners/insiders. Send us a message to dicuss We are looking for new partners/insiders. Send us a message to dicuss CRITICAL ANNOUNCEMENTS × Contact Update We have changed our contact method. We now exclusively use qTox Messenger for all communications. SimpleX and Session have been discontinued. Our Tox ID: A7580331D4D16453CCE86D7ADFBCF0CEED0D0D1AEA8F4DBEEBCA9E3B46308F260DE9B41BD838 TO APTIM You may have noticed the sudden, heavy silence. The corporate VPNs are dead. We have been the silent architects of your network for the past three weeks. While your "elite" investigators from Mandiant sat in your logs, we sat directly beside them burning through over a hundred of your corporate identities like disposable tools. we have had your entire network and internal protocols. HOW LONG WILL YOU KEEP YOUR THOUSANDS OF FIELD WORKERS LOCKED OUT? We have successfully exfiltrated the most sensitive engineering data held by any firm in your sectors We hold the complete Navisworks 3D models, P&ID diagrams, and maintenance logic for your major energy plants. This includes the granular Honeywell DCS controller logic. We know…
Sources
Source
Indexed 8 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
