Ransomware victim disclosure
← All victimsSincroslab Sas
Claimed by Stormous · listed 2 months ago
Status timeline
- Listed
Mar 29, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileSincroslab Sas is a company headquartered in Bogota D.C., Colombia, operating in the Miscellaneous Nondurable Goods Merchant Wholesalers sector. Beyond its registered industry classification and location, no further operational details are publicly available from the provided sources.
- Industry
- Miscellaneous Nondurable Goods Merchant Wholesaling
- Address
- Bogota D.C., Colombia
Attack summary
Severity: medium — Data is listed as published (disclosed status: data_published) with 33 GB exfiltrated, but the leak post provides no specific detail on the nature of Sincroslab's data (e.g. PII at scale, financial, medical). The low ransom amount and lack of described sensitive data categories limit severity to medium.The Stormous group claims to have exfiltrated 33 GB of data from Sincroslab Sas and has published the data, with a ransom demand of $900. The specific contents of the exfiltrated data are not itemised in the leak post excerpt for this victim.
Data the group says was taken
AI dossier — extracted from the leak post- Internal corporate documents
- Business data
What the group claims
Customer names, identification numbers, production orders, client records, delivery tracking data, customer information, logos.
The leak post
captured from the group's siteInitial Access Brokers - Long-Term Collaboration We are currently seeking reliable Initial Access Brokers for long-term collaboration. ** Please do not waste time attempting complex exploit development or direct EDR confrontation. We are interested exclusively in stable corporate access. Local user access is acceptable. * Small to mid-sized enterprises: fixed payment starting at * Large enterprises: revenue share from final settlement FANASA.COM Half the data has been extracted Personally Identifiable Information (PII), Electronic Fiscal Documents (CFDI/XML), Financial Transaction Records, Commercial Invoices & Billing Data, Taxpayer Identification Numbers (RFC), Client & Vendor Database/Internal Corporate Documentation Administrative/System Files/ADMIN, DOAS, operational records, engineering drawings, schematics... Project Planning & Execution Documents... (Folders/Files) Email/Communication/System/Application Data AYEAPLICACIONES database/Log Data BDATOSFITCLOD, Software/Installation/Program Files AUTOBOU, Personal/Miscellaneous Files AvenaCubana All of this data is offered for sale (user information: email, phone number, full name, date of birth / payment and bookin…
Data the group says was taken
- PII
Sources
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
