Ransomware victim disclosure
← All victimsPortesa
Claimed by Trigona · listed 3 years ago
Status timeline
- Listed
Oct 1, 2023
- Data leaked
At a glance
- Group
- Trigona
- Status
- Data leaked
- Country
- Portugal
- Sector
- Food & Agriculture
- Listed on leak site
- Oct 1, 2023
About the victim
AI dossier — public-source company profilePortesa is a livestock company based in Portugal focused on transforming raw materials into high-quality products at the source. It operates in collaboration with partner companies Cartesa and Aire Sano as part of an integrated production process. The group emphasises innovation, sustainability, and product traceability across European markets.
- Industry
- Livestock Processing & Circular Economy
Attack summary
Severity: high — Data has been published by the threat actor, confirming exfiltration of what is likely significant business and operational data from a multi-entity livestock production operation; published data raises severity above medium even without explicit PII or regulated data confirmation.The Trigona ransomware group claims to have compromised Portesa and has published data (disclosed status: data_published), suggesting both exfiltration and likely encryption occurred. No specific data volume or ransom amount was stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Business operational data
- Supply chain and traceability records
- Potentially partner/affiliate company data (Cartesa, Aire Sano)
What the group claims
Portesa is a forward-thinking livestock company with a strong commitment to innovation, sustainability, and the circular economy. Company is dedicated to transforming raw materials into high-quality products directly at the source. The company operates in collaboration with Cartesa and Aire Sano, forming an integrated production process that sets the industry benchmark for product traceability throughout Europe.
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
