Ransomware victim disclosure
← All victimsELO Digital Office
Claimed by AiLock · listed 3 months ago
Status timeline
- Listed
Mar 3, 2026
- Data leaked
At a glance
- Group
- AiLock
- Status
- Data leaked
- Country
- Germany
- Sector
- Technology
- Listed on leak site
- Mar 3, 2026
About the victim
AI dossier — public-source company profileELO Digital Office is a Stuttgart-based German software company founded in 1996 that develops enterprise content management (ECM) systems and digitalization solutions. Its flagship product, the ELO ECM Suite, serves over 1.3 million users globally, supporting document management, process automation, archiving, and AI-driven workflows. The company targets industries including healthcare, finance, public administration, manufacturing, and more.
- Industry
- Enterprise Content Management Software
- Address
- Stuttgart, Germany
- Employees
- 201-500
- Founded
- 1996
Attack summary
Severity: high — Data has been published by the threat actor against a software company whose ECM platform serves over 1.3 million enterprise users; a breach of this vendor could expose customer data, source code, or integration credentials, representing significant business and potentially supply-chain risk.The AiLock ransomware group claims to have attacked ELO Digital Office and has published data (disclosed status: data_published), though the leak post does not specify the volume of exfiltrated data or whether encryption was also performed.
Data the group says was taken
AI dossier — extracted from the leak post- Internal business documents
- Software development assets
- Corporate records
What the group claims
ELO Digital Office, founded in 1996 and headquartered in Stuggart, Germany, is a provider of enterprise content management systems and develops software solutions to digitize business processes.
Sources
- Victim siteelo.com
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
