Ransomware victim disclosure
← All victimsCourtSmart
Claimed by medusalocker · listed 15 days ago
Status timeline
- Listed
May 5, 2026
- Data leaked
At a glance
- Group
- medusalocker
- Status
- Data leaked
- Country
- US
- Sector
- Business Services
- Listed on leak site
- May 5, 2026
About the victim
AI dossier — public-source company profileCourtSmart (courtsmart.com) is a US-based court technology company providing software and services to court systems. Based on the leak post's references to connections with JIS.org (Justice Information Systems) and nashville.org, the company appears to serve judicial and government clients. No further details about scale or headquarters are publicly confirmed from available sources.
- Industry
- Court Technology & Legal Software
Attack summary
Severity: high — Data has been published (disclosed status: data_published) and the victim serves court/judicial government clients, suggesting exposure of potentially sensitive government and legal records. Connections to justice information systems and municipal government domains elevate risk significantly.MedusaLocker claims to have compromised CourtSmart, including access to a development server (dev-rich20.courtsmart.com), with data subsequently published. The post references connections to court-related government entities (JIS.org, nashville.org), suggesting potentially sensitive government and judicial data was accessed.
Data the group says was taken
AI dossier — extracted from the leak post- Development server data
- Court system integration data
- Potentially government/judicial records
- Internal network/domain information
What the group claims
Court technology company. Domain courtsmart.com / COURTSMART2. Dev server: dev-rich20.courtsmart.com. Connections to JIS.org, nashville.org.
The leak post
captured from the group's siteFile Manager File Manager home page BARAAAI Data is being prepared for publication. BAPAMAI Data is being prepared for publication. BAUARAI Data is being prepared for publication. BAVADAI Data is being prepared for publication. BAVACAI Data is being prepared for publication. BAVAQAI Data is being prepared for publication. Raycolighting DEMO 3137 S Alameda Street, Los Angeles, CA 90058, USA $10 000 Organization with 2 emails extracted. Domain: raycolighting.com baralai Data is being prepared for publication. CEAGESP / Netfeirasp DEMO São Paulo, Brazil $20 000 Brazilian produce wholesale market network. Domain netfeirasp.ceagesp (CEAGESP). Also demarchibrasil.com.br accounts. Colegio María Inmaculada (CMI) DEMO Moravia, San José, Costa Rica $50000 Catholic school in Moravia, Costa Rica. Domain cmi.local / mariainmaculada.ed.cr. Servers: CMI-DC01, CMI-APP, CMI-HTTP2, main-server1/2. Académie de Montpellier / CSJM DEMO Béziers, Occitanie, France $15000 French public school network. Domain CSJM.BEZIERS, part of Académie de Montpellier (ac-montpellier.fr). Occitanie region (laregion.fr). Teacher and admin staff credentials. Palmers Relocations DEMO Victoria, Australia $63 000 Australian …
Sources
Source
Indexed 15 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
