Ransomware victim disclosure
← All victimsTiger Communications
listed as TigerCommunications · Claimed by securotrop · listed 9 months ago
Status timeline
- Listed
Aug 11, 2025
- Data leaked
At a glance
- Group
- securotrop
- Status
- Data leaked
- Country
- United Kingdom
- Sector
- Telecommunication
- Listed on leak site
- Aug 11, 2025
About the victim
AI dossier — public-source company profileTiger Communications is a UK-based vendor-agnostic data specialist providing unified communications (UC) analytics software. Their flagship product, Tiger Prism, offers call logging, billing and cost allocation, compliance recording, and analytics across major UC platforms (Microsoft Teams, Cisco, Webex, Zoom). They serve enterprises across banking, financial services, healthcare, education, and public sector.
- Industry
- Unified Communications & Analytics Software
Attack summary
Severity: medium — Data published status confirmed, but the leak post excerpt provided contains only AI-generated marketing copy about the company with no actual proof files, screenshots, or specific details about what data was exfiltrated. Without visible proof or inventory of sensitive data, severity cannot be elevated despite the disclosure.The securotrop group claims to have attacked TigerCommunications and published data. The specific nature of the exfiltration (encryption, data theft, or both) and the scope of disclosed data are not detailed in the available post excerpt.
Original description
AI-summarised, not from the leak postTigerCommunications is a UK-based company dedicated to providing specialized business communications analytics for various industries. It offers a range of services such as call logging, fraud detection, and systems integration. Their solutions help clients optimize communication infrastructure, control costs, improve productivity and ensure compliance. With over 30 years of experience, the company supports enterprises around the globe.
Sources
Source
Indexed 9 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
