Ransomware victim disclosure
← All victimsCS Caritas Socialis
listed as cs.at · Claimed by devman · listed 4 months ago
Status timeline
- Listed
Jan 26, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileCS Caritas Socialis is an Austrian non-profit organisation based in Vienna that provides integrated care and support services across a broad spectrum of needs, including home care, day centres for seniors, long-term residential care, Alzheimer and dementia specialised facilities, hospice care, multiple sclerosis care, kindergartens, and a mother-and-child shelter. It operates multiple facilities in and around Vienna and is affiliated with the Catholic Caritas network. The organisation also relies on donations and volunteer contributions to fund its social mission.
- Industry
- Healthcare & Social Services (Elderly Care, Hospice, Dementia Care)
- Address
- Vienna, Austria
Attack summary
Severity: critical — The victim is a healthcare and social-care non-profit handling highly sensitive personal data of vulnerable individuals (elderly, terminally ill, dementia patients, children, mothers in crisis). The exfiltrated data includes client records (likely containing medical/personal PII), HR records (employee PII), and insurance data — all categories of regulated, sensitive data. The disclosure status is 'data_published', confirming actual exfiltration and release.The group 'devman' claims to have exfiltrated insurance data, HR data, and client data from CS Caritas Socialis, with the disclosure status recorded as data_published, indicating the stolen data has already been released.
Data the group says was taken
AI dossier — extracted from the leak post- Insurance data
- HR data
- Client data
What the group claims
Insurance data, Hr data, client data
Sources
- Victim sitecs.at
- Leak posthttp://devmanblggk7ddrtqj3tsocnayow3bwnozab2s4yhv4shpv6ueitjzid.onion
Source
Indexed 4 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
