Ransomware victim disclosure
← All victimsAccountnet
Claimed by sinobi · listed 3 months ago
Status timeline
- Listed
Feb 6, 2026
- Data leaked
At a glance
- Group
- sinobi
- Status
- Data leaked
- Country
- United States
- Sector
- Financial Services
- Listed on leak site
- Feb 6, 2026
About the victim
AI dossier — public-source company profileAccountnet Inc is a Microsoft Dynamics partner and accounting software consulting firm serving the Greater New York City tri-state region. The company provides implementation, hosting, and support services for Microsoft Dynamics 365 Business Central, Dynamics GP, Dynamics SL, NetSuite, and Acumatica to clients in financial services, healthcare, business services, and non-profit sectors. It also offers educational webinars, newsletters, and post-sales support to its client base.
- Industry
- Microsoft Dynamics ERP & Accounting Software Consulting
- Address
- Metro New York / Tri-state region (specific street address not publicly stated)
Attack summary
Severity: high — Data has been published (not merely listed), meaning exfiltration is claimed as confirmed. As an ERP/accounting software consultancy, Accountnet likely holds sensitive financial records, client accounting data, and potentially healthcare and non-profit client data — all of which are regulated or highly sensitive. The breadth of client verticals (finance, healthcare, non-profits) elevates potential downstream impact.The sinobi ransomware group claims to have compromised Accountnet Inc and has published data (disclosed_status: data_published); the leak post offers only a brief company description with no explicit detail on whether encryption, exfiltration, or both occurred, and no ransom amount or data volume was stated.
Data the group says was taken
AI dossier — extracted from the leak post- Undisclosed published data files
What the group claims
Accountnet Inc provides educational webinars, newsletters, quarterly sales events and strong post-sales support
Sources
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
