Ransomware victim disclosure
← All victimsCertified Information Security (Certified Tech Trainers, CTT)
listed as certifiedinfosec.com · Claimed by apt73 · listed 23 days ago
Status timeline
- Listed
Apr 27, 2026
- Data leaked
At a glance
- Group
- apt73
- Status
- Data leaked
- Country
- US
- Sector
- Business Services
- Listed on leak site
- Apr 27, 2026
About the victim
AI dossier — public-source company profileCertified Information Security is a registered trade name for Certified Tech Trainers (CTT), a US-based professional training and certification company. It offers courses and certifications in cybersecurity frameworks (NIST CSF, ISO 27001), AI management (NIST AI RMF, ISO 42001), governance, risk, compliance, business continuity, and fraud prevention. The company serves professionals seeking internationally recognized credentials and is built around globally recognized standards led by practitioners.
- Industry
- Cybersecurity & IT Governance Training and Certification
Attack summary
Severity: high — Data has been published (data_published status confirmed), meaning exfiltration is claimed and materials have been released. The victim is a cybersecurity training and certification company, meaning exposed data could include customer PII, professional credentials, and sensitive business information, warranting a high severity rating even without explicit data volume details.The group APT73 claims an attack on certifiedinfosec.com and has published data (disclosed status: data_published), though the truncated leak post does not specify whether encryption, exfiltration, or both occurred, nor does it detail the volume or type of data exposed.
Data the group says was taken
AI dossier — extracted from the leak post- Customer/student records
- Training and certification data
- Business operational data
What the group claims
Certified Information Security is a registered trade name for Certified Tech Trainers (CTT) (D-U-...
Sources
Source
Indexed 23 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
