Ransomware victim disclosure
← All victimsFANASA.COM UPDATE-FULL DATA DUMP
Claimed by stormous · listed 9 days ago
Status timeline
- Listed
May 11, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileFANASA.COM appears to be a Mexican company, likely operating in wholesale distribution or commercial services based on the nature of the leaked data (CFDI/XML fiscal documents, commercial invoices, client and vendor databases). The company is subject to Mexican tax regulations (RFC taxpayer identification system). No public site content was available to further clarify its operations or scale.
- Industry
- Wholesale Distribution or Commercial Services
Attack summary
Severity: high — Confirmed exfiltration and publication of a full data dump containing PII, financial transaction records, taxpayer identification numbers (RFC), and client/vendor databases constitutes significant exposure of regulated and sensitive personal and financial data, meeting the threshold for high severity.The Stormous ransomware group claims to have exfiltrated a full data dump from FANASA.COM, publishing data described as including PII, electronic fiscal documents, financial transaction records, commercial invoices, taxpayer identification numbers, and client/vendor databases. The disclosure is marked as data_published, indicating the data has been released.
Data the group says was taken
AI dossier — extracted from the leak post- Personally Identifiable Information (PII)
- Electronic Fiscal Documents (CFDI/XML)
- Financial Transaction Records
- Commercial Invoices & Billing Data
- Taxpayer Identification Numbers (RFC)
- Client & Vendor Database
- Internal Corporate Documentation
What the group claims
Personally Identifiable Information (PII), Electronic Fiscal Documents (CFDI/XML), Financial Transaction Records, Commercial Invoices & Billing Data, Taxpayer Identification Numbers (RFC), Client & Vendor Database/Internal Corporate Documentation
Source
Indexed 9 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
