Ransomware victim disclosure
← All victimspay***
Claimed by vect · listed 3 months ago
Status timeline
- Listed
Feb 24, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileThe victim appears to be a payment-related financial services company operating under the domain pay***.com, based in Egypt. The company likely provides payment processing or financial transaction services given the sector classification of 'Finance' in the leak post. No further details are publicly available from the site excerpt provided.
- Industry
- Financial Services / Payment Processing
Attack summary
Severity: medium — The target operates in the Finance/Payment sector, which typically handles sensitive financial and PII data, elevating potential impact. However, the post is still in negotiation status with no confirmed data publication, no proof files advertised, and no data inventory disclosed, limiting the verifiable severity at this time.The group 'vect' claims to have attacked the company and lists the status as 'NEGOTIATING' with an active deadline, indicating an ongoing extortion attempt likely involving data exfiltration and/or encryption. No specific data types or volumes have been disclosed at this stage.
Data the group says was taken
AI dossier — extracted from the leak post- Unspecified financial data
What the group claims
Status: STATUS: NEGOTIATING | Sector: Finance | Deadline: 18d 19h
Sources
- Victim sitepay***.com
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
