Ransomware victim disclosure
← All victimsLandeshauptstadt Stuttgart
Claimed by rhysida · listed 2 days ago
Status timeline
- Listed
May 19, 2026
- Data leaked
At a glance
- Group
- rhysida
- Status
- Data leaked
- Country
- DE
- Sector
- Public Sector
- Listed on leak site
- May 19, 2026
About the victim
AI dossier — public-source company profileLandeshauptstadt Stuttgart is the capital city of the state of Baden-Württemberg in southwestern Germany and one of the country's largest cities with a population of approximately 630,000. The city administration provides a wide range of public services including civil registration, social services, urban planning, public health, transport, and citizen engagement. It operates numerous municipal institutions including Klinikum Stuttgart (hospital), public baths, and cultural facilities.
- Industry
- Municipal Government Administration
- Address
- Marktplatz 1, 70173 Stuttgart, Baden-Württemberg, Germany
- Employees
- 10000+
- Founded
- 1219
Attack summary
Severity: critical — Stuttgart is a major state capital municipal government. An attack with confirmed data publication on a large public-sector entity of this scale almost certainly involves PII of hundreds of thousands of citizens, sensitive administrative records, and potentially health or social services data — all regulated categories under GDPR and German public law.Rhysida claims to have attacked Landeshauptstadt Stuttgart and has published data (disclosed status: data_published), indicating exfiltration of data from the municipal government's systems. The leak post provides minimal detail on the specific data categories or volume exfiltrated.
Data the group says was taken
AI dossier — extracted from the leak post- Municipal government records
- Citizen data
- Administrative documents
What the group claims
Landeshauptstadt Stuttgart Stuttgart is the capital city of Baden-Wurttemberg in southwestern Germany.
Sources
- Victim sitestuttgart.de
Source
Indexed 2 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
