Ransomware victim disclosure
← All victimskeliweb
Claimed by vect · listed 3 months ago
Status timeline
- Listed
Feb 28, 2026
- Data leaked
At a glance
- Group
- vect
- Status
- Data leaked
- Country
- Italy
- Sector
- Technology
- Listed on leak site
- Feb 28, 2026
- Data size
- 200 GB
About the victim
AI dossier — public-source company profileKeliweb is an Italian web hosting and cloud services provider based in Calabria, Italy, offering shared hosting, dedicated servers, VPS, CDN, domain registration, SSL certificates, PEC (certified email), and cloud backup solutions. The company operates its own datacenter with a stated SLA of 99.99% uptime and holds ISO certifications. Its services target individuals, businesses, web agencies, and public administration clients across Italy.
- Industry
- Web Hosting & Cloud Services
- Address
- Via della Resistenza, Rende (CS), Calabria, Italy
- Employees
- 11-50
Attack summary
Severity: critical — Keliweb is a multi-tenant hosting provider; a 200 GB exfiltration likely encompasses PII and business-sensitive data of thousands of downstream customers (individuals and businesses), including email, domain, and billing records — constituting large-scale regulated data exposure affecting third parties beyond the direct victim.The group 'vect' claims to have exfiltrated approximately 200 GB of data from Keliweb and reports the status as 'Negotiating' with a 28-day deadline, indicating both potential encryption and confirmed or imminent data publication. No ransom amount has been stated.
Data the group says was taken
AI dossier — extracted from the leak post- Customer account data
- Domain registration records
- Hosting configuration data
- Business/company files
- Potentially PII of hosted clients
What the group claims
Status: STATUS: NEGOTIATING | Sector: IT | DATA SIZE: 200GB | Deadline: 28d 7h
Sources
- Victim sitekeliweb.it
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
