Ransomware victim disclosure
← All victimsPastas Allegri
Claimed by ORION · listed 7 days ago
Status timeline
- Listed
May 14, 2026
Current state: Listed for ransom
At a glance
- Group
- ORION
- Status
- Listed for ransom
- Country
- Venezuela
- Sector
- Food Manufacturing
- Listed on leak site
- May 14, 2026
About the victim
AI dossier — public-source company profilePastas Allegri is a Venezuelan food manufacturer with over 139–144 years of history (founded approximately 1881–1882), producing pasta and enriched flour products for the Venezuelan consumer market. The company sources raw materials from the United States and Canada and distributes nationally, emphasising quality, nutrition, and family tradition. It is one of Venezuela's long-standing staple food brands.
- Industry
- Pasta & Flour Food Manufacturing
- Founded
- 1882
Attack summary
Severity: low — The post is a bare listing with no ransom stated, no data size disclosed, no proof files published, and no confirmed exfiltration or operational disruption described.The ORION ransomware group (OrionRaaS) has listed Pastas Allegri as a victim, claiming a data breach and corporate exposure; no specific exfiltration volume, ransom demand, or proof files have been published at this stage.
Data the group says was taken
AI dossier — extracted from the leak post- Confidential corporate data (unspecified)
What the group claims
Pastas Allegri is characterized as an innovative and solid company, committed to Venezuela, generating more and more jobs throughout the country every day
The leak post
captured from the group's siteLatest confidential data breaches and corporate exposures Pastas Allegri https://pastasallegri.com.ve Pastas Allegri is characterized as an innovative and solid company, committed to Venezuela, generating more and more jobs throughout the country every day ##### Your clicks can earn you a Lamborghini Join the elite drive your success The OrionRaaS Network [ Apr 14 · ](http://cjfntkj5qeizxowuy3srceg7zo6namc3kfeor7pfn6bpdkl3w265ooid.onion/news/article?id=36) [ Jan 26 · ](http://cjfntkj5qeizxowuy3srceg7zo6namc3kfeor7pfn6bpdkl3w265ooid.onion/news/article?id=34) ###### [Your clicks can earn you a Lamborghini Jan 25 · ](http://cjfntkj5qeizxowuy3srceg7zo6namc3kfeor7pfn6bpdkl3w265ooid.onion/news/article?id=33) [ Oct 28 · ](http://cjfntkj5qeizxowuy3srceg7zo6namc3kfeor7pfn6bpdkl3w265ooid.onion/news/article?id=30) [ Oct 28 · ](http://cjfntkj5qeizxowuy3srceg7zo6namc3kfeor7pfn6bpdkl3w265ooid.onion/news/article?id=29) Stay updated with the latest data breaches and corporate exposures. Our platform tracks and reports on significant cybersecurity incidents.
Screenshot of the leak post

Sources
Source
Indexed 7 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
