Ransomware victim disclosure
← All victimsTranssion
Claimed by AiLock · listed 3 months ago
Status timeline
- Listed
Mar 6, 2026
- Data leaked
At a glance
- Group
- AiLock
- Status
- Data leaked
- Country
- China
- Sector
- Technology
- Listed on leak site
- Mar 6, 2026
About the victim
AI dossier — public-source company profileTranssion Holdings is a diversified international telecommunications manufacturing company founded in 2006, specializing in mobility solutions. The company operates in over 50 countries globally and is particularly well known for its mobile phone brands targeting emerging markets in Africa, South Asia, and the Middle East. It is headquartered in Shenzhen, China.
- Industry
- Telecommunications & Mobile Device Manufacturing
- Employees
- 10001+
- Founded
- 2006
Attack summary
Severity: high — Confirmed exfiltration and publication of proprietary source code, NDA documents, and internal business data from a large multinational technology manufacturer represents significant intellectual property and contractual exposure, though no PII at scale or regulated personal data is explicitly claimed.AiLock claims to have exfiltrated internal data from Transsion Holdings, including source code repositories (git/git-ai), vendor proprietary code, NDA documents, and other internal documents, with the disclosure status indicating the data has been published.
Data the group says was taken
AI dossier — extracted from the leak post- Git source code repositories
- AI-related git repositories
- Vendor proprietary source code
- NDA documents
- Internal documents
What the group claims
Transsion Holdings is a diversified international telecommunications manufacturing company founded in 2006, specializing in mobility solutions with operations in over 50 countries globally.The data contains git, git-ai, vendor proprietary code, NDA documents, and other internal documents.
Sources
- Victim sitetranssion.com
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
