Ransomware victim disclosure
← All victimsBucks County Opportunity Council, INC.
Claimed by Moneymessage · listed 10 months ago
Status timeline
- Listed
Aug 4, 2025
- Data leaked
At a glance
- Group
- Moneymessage
- Status
- Data leaked
- Country
- United States
- Sector
- Public Sector
- Listed on leak site
- Aug 4, 2025
About the victim
AI dossier — public-source company profileBucks County Opportunity Council, Inc. (BCOC) is a non-profit organization in Pennsylvania dedicated to empowering low-income families toward economic self-sufficiency. The organization provides food assistance, adult education, financial coaching, and housing services, with a focus on fostering community economic stability in the Bucks County region.
- Industry
- Non-profit Social Services & Community Development
Attack summary
Severity: high — Non-profit serving vulnerable low-income populations likely maintains PII and financial data at scale. Confirmed data publication by threat actor. Potential exposure of sensitive client information and organizational financial records.The Moneymessage group claims to have conducted an attack on BCOC and published data from the incident. No specific technical details of the attack method (encryption, exfiltration, or both) are provided in the available post excerpt.
Data the group says was taken
AI dossier — extracted from the leak post- client personal information
- financial records
- housing assistance data
- program enrollment records
Original description
AI-summarised, not from the leak postThe Bucks County Opportunity Council, Inc. (BCOC) is a non-profit organization in Pennsylvania, USA. It is devoted to empowering low-income families to achieve economic self-sufficiency through their various programs. BCOC provides services like food assistance, adult education, financial coaching, and housing services, and designs community strategies to help foster economic stability in the region.
Sources
Source
Indexed 10 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
