Ransomware victim disclosure
← All victimsRotak S.N.C.
listed as rotak.it · Claimed by m3rx · listed 22 days ago
Status timeline
- Listed
Apr 29, 2026
- Data leaked
At a glance
- Group
- m3rx
- Status
- Data leaked
- Country
- IT
- Sector
- Technology
- Listed on leak site
- Apr 29, 2026
About the victim
AI dossier — public-source company profileRotak S.N.C. is a Sicilian company founded in March 1989, specialising in the repair, distribution, and commercialisation of automotive and fleet-management products, with a particular focus on digital and analogue tachographs, speed limiters, satellite localisation, and telematics. The company is an authorised Continental/VDO dealer and service centre covering Sicily and Calabria, and historically generated combined revenues of approximately €9.5 million. It also has interests in industrial automatic lubrication systems and fuel distribution.
- Industry
- Fleet Management, Tachograph Services & Automotive Telematics
- Address
- Priolo Gargallo (Siracusa), Sicily, Italy
- Employees
- 11-50
- Founded
- 1989
Attack summary
Severity: high — 22.5 GB / 20,000 files have been published, indicating confirmed exfiltration of significant business data. Given the company handles fleet telematics, vehicle location data, and commercial client records (including transport and fuel sectors), the exposure likely includes sensitive operational and potentially personal data at meaningful scale.The threat actor m3rx claims to have exfiltrated approximately 22.5 GB of data comprising around 20,000 files from Rotak S.N.C., with the data described as published (disclosed status: data_published). No encryption claim is explicitly stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Business/operational files (20,000 files, 22.5 GB)
- Fleet management data
- Customer records
- Vehicle telematics data
- Financial/commercial documents
What the group claims
Rotak (specifically in the context of Rotak Instruments) focuses on the distribution of specialized medical and analytical instrumentation, with related entities in industrial engineering and automation Stolen: 22.5gb 20k files
The leak post
captured from the group's siteIf you are interested in this data, please contact our support.Tox: 9A1217BEDA4AB77052A25D17CB6FFB34AFA2BE462E607F2FD8E1DF1DDD4CA16A64E18B1A0BF2
Sources
- Victim siterotak.it
- Leak posthttp://4k6plf4h2cm2nco6ae3inrsxnmqgl6lllmwefydhnlcq4tuhwbj4qpad.onion
Source
Indexed 22 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
