Ransomware victim disclosure
← All victimsUniversity of Macedonia
listed as UOM University · Claimed by coinbasecartel · listed 1 month ago
Status timeline
- Listed
Apr 15, 2026
- Data leaked
At a glance
- Group
- coinbasecartel
- Status
- Data leaked
- Country
- MT
- Sector
- Education
- Listed on leak site
- Apr 15, 2026
About the victim
AI dossier — public-source company profileThe University of Macedonia (Πανεπιστήμιο Μακεδονίας) is a public higher education institution located in Thessaloniki, Greece. It offers undergraduate and postgraduate programs across schools covering Economics, Business Administration, Information Sciences, and Social and Humanistic Sciences. It is an internationally recognised academic institution serving the educational, cultural, and economic life of Northern Greece.
- Industry
- Higher Education
- Address
- 156 Egnatia Street, Thessaloniki 54636, Greece
- Employees
- 501-1000
- Founded
- 1948
Attack summary
Severity: high — The disclosure status is 'data_published', indicating confirmed exfiltration from a public university that holds PII of students and staff, academic records, and potentially research data at meaningful scale, though no ransom or specific data volume was stated.The coinbasecartel group claims to have attacked the University of Macedonia and lists the disclosure status as data_published, indicating data exfiltration has occurred; however, the leak post itself contains no specific details about the nature of the attack, encrypted systems, or the precise data stolen.
Data the group says was taken
AI dossier — extracted from the leak post- Student records
- Staff/faculty personal data
- Academic administrative data
- Research data
- Financial/procurement records
Original description
AI-summarised, not from the leak postN/A
The leak post
captured from the group's siteSystem Breach • Coinbasecartel We are looking for new partners/insiders. Send us a message to dicuss We are looking for new partners/insiders. Send us a message to dicuss CRITICAL ANNOUNCEMENTS × Contact Update We have changed our contact method. We now exclusively use qTox Messenger for all communications. SimpleX and Session have been discontinued. Our Tox ID: A7580331D4D16453CCE86D7ADFBCF0CEED0D0D1AEA8F4DBEEBCA9E3B46308F260DE9B41BD838 TO APTIM You may have noticed the sudden, heavy silence. The corporate VPNs are dead. We have been the silent architects of your network for the past three weeks. While your "elite" investigators from Mandiant sat in your logs, we sat directly beside them burning through over a hundred of your corporate identities like disposable tools. we have had your entire network and internal protocols. HOW LONG WILL YOU KEEP YOUR THOUSANDS OF FIELD WORKERS LOCKED OUT? We have successfully exfiltrated the most sensitive engineering data held by any firm in your sectors We hold the complete Navisworks 3D models, P&ID diagrams, and maintenance logic for your major energy plants. This includes the granular Honeywell DCS controller logic. We know…
Sources
Source
Indexed 1 month agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
