Ransomware victim disclosure
← All victimsTelecommunications Services of Trinidad and Tobago (tstt.co.tt)
Claimed by Ransomexx · listed 3 years ago
Status timeline
- Listed
Oct 27, 2023
- Data leaked
At a glance
- Group
- Ransomexx
- Status
- Data leaked
- Country
- Trinidad and Tobago
- Sector
- Telecommunications
- Listed on leak site
- Oct 27, 2023
- Records
- 4293368 customer
About the victim
AI dossier — public-source company profileTelecommunications Services of Trinidad and Tobago (TSTT) is the national telecommunications provider of Trinidad and Tobago, operating under the TSTT and bmobile brands. The company offers fixed-line, mobile, broadband, and enterprise telecommunications services across the twin-island republic. It is majority state-owned and serves a substantial portion of the country's residential and business customers.
- Industry
- Telecommunications
- Address
- Corner Victoria Avenue & Church Street, Port of Spain, Trinidad and Tobago
- Employees
- 1001-5000
- Founded
- 1989
Attack summary
Severity: critical — Mass exfiltration of PII at national scale (4.29M customer records) from a state-owned telecoms provider, including identity document scans and internal database dumps, with data already published — affecting a significant proportion of Trinidad and Tobago's entire population.RansomExx claims to have exfiltrated data from TSTT and its bmobile brand, including records associated with approximately 4,293,368 customer lines, identity document scans, GitLab source code repositories, and database dumps. The data has been published, indicating exfiltration and public disclosure rather than encryption-only.
Data the group says was taken
AI dossier — extracted from the leak post- Customer line records (~4.29 million)
- Government/national ID scans
- GitLab source code projects
- Database dumps
What the group claims
tstt.co.tt and bmobile.co.tt. 4293368 customer's lines, ID scans, gitlab projects, db dumps.
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
