Ransomware victim disclosure
← All victimsOneSupport
listed as ONESUPPORT.COM · Claimed by clop · listed 3 months ago
Status timeline
- Listed
Feb 14, 2026
- Data leaked
At a glance
- Group
- clop
- Status
- Data leaked
- Country
- United States
- Sector
- Technology
- Listed on leak site
- Feb 14, 2026
About the victim
AI dossier — public-source company profileOneSupport operates a unified customer experience (CX) platform and cloud-based contact center solution, serving businesses in the United States. The company provides outsourced technical support and customer service offerings delivered via cloud infrastructure. Its clients span multiple sectors relying on managed CX and helpdesk capabilities.
- Industry
- Customer Experience & Cloud Contact Center Services
Attack summary
Severity: high — Clop is a prolific exfiltration-focused group and the disclosure status is marked as data_published, confirming data was released. OneSupport handles customer interactions and contact center operations, meaning exfiltrated data likely includes business client records, customer PII, and operational data. Without confirmed regulated data (e.g., medical/financial) at scale, critical is not warranted, but high is appropriate given Clop's track record and confirmed publication.The Clop ransomware group claims to have compromised OneSupport and has listed the disclosure status as data_published, indicating exfiltration and publication of company data. The specific contents of the published data are not detailed in the available leak post excerpt.
Data the group says was taken
AI dossier — extracted from the leak post- Business data (unspecified)
Original description
AI-summarised, not from the leak postONESUPPORT.COM is a company that offers a variety of technical assistance options to individuals and businesses. Services include troubleshooting and problem-solving for issues relating to internet connectivity, devices, software applications, and more. Their team of professionals provides 24/7 support, aiming to deliver high-quality, user-friendly and efficient solutions based on user needs.
The leak post
captured from the group's siteYou have been placed in a queue, awaiting forwarding to the platform. Please do not refresh the page, you will be automatically redirected.
Sources
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
