Ransomware victim disclosure
← All victimsBayu Buana Travel Service
Claimed by crypto24 · listed 6 months ago
Status timeline
- Listed
Nov 15, 2025
- Data leaked
At a glance
- Group
- crypto24
- Status
- Data leaked
- Country
- ID
- Sector
- Hospitality and Tourism
- Listed on leak site
- Nov 15, 2025
- Data size
- 500 GB
About the victim
AI dossier — public-source company profileBayu Buana Travel Services is an Indonesian travel and tour operator headquartered in Jakarta, offering packaged tours to destinations across Europe, Asia, Australia, the Americas, Africa, and the Middle East. The company provides both leisure and group travel packages and operates a customer-facing online booking platform. It is a well-known retail travel brand in Indonesia with hundreds of tour products listed across multiple regions.
- Industry
- Travel & Tour Operator Services
- Address
- Jakarta, Indonesia
Attack summary
Severity: high — 500 GB of confirmed exfiltrated data including customer PII (names, travel bookings, contact details) and internal business documents from a consumer-facing travel operator constitutes significant data exposure at scale; data has been published, elevating severity beyond medium.The group crypto24 claims to have exfiltrated over 500 GB of data from Bayu Buana Travel Services' internal network, including internal company documents, customer information, and project data. The disclosure status indicates the data has been published.
Data the group says was taken
AI dossier — extracted from the leak post- Internal company documents
- Customer information
- Project information
- Data stored within internal systems
What the group claims
We have successfully extracted over 500GB of documents from your internal network, including internal company documents, customer and project information, and other data stored within your internal systems.
Sources
- Victim sitewww.bayubuanatravel.com
Source
Indexed 6 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
