Ransomware victim disclosure
← All victimsInstitute of Science Tokyo
listed as Rogiken / Institute of Science Tokyo · Claimed by coinbasecartel · listed 7 days ago
Status timeline
- Listed
May 14, 2026
Current state: Listed for ransom
At a glance
- Group
- coinbasecartel
- Status
- Listed for ransom
- Country
- Japan
- Sector
- Education/Research
- Listed on leak site
- May 14, 2026
- Data size
- 43 GB
About the victim
AI dossier — public-source company profileInstitute of Science Tokyo (formerly Tokyo Institute of Technology and Tokyo Medical and Dental University, merged in 2024) is a major Japanese national research university located in Tokyo, Japan. It conducts advanced research and education across science, engineering, and medicine. It is one of Japan's leading research institutions with thousands of students and faculty.
- Industry
- Higher Education & Scientific Research
- Founded
- 2024
Attack summary
Severity: medium — The victim is a major national research university with significant research data; however, no specific data has been described or proof published for this particular victim — it is listed alongside others with a vague promise of future disclosure, warranting medium rather than high severity.The coinbasecartel group claims to have exfiltrated data from Rogiken / Institute of Science Tokyo and lists it among multiple victims, with no specific data type or volume described for this victim. No proof files or samples have been published for this victim as of the listing; the post notes the group will 'get around' to publishing data.
The leak post
captured from the group's siteWe have changed our contact method. We now exclusively use qTox Messenger for all communications. SimpleX and Session have been discontinued. Our Tox ID: A7580331D4D16453CCE86D7ADFBCF0CEED0D0D1AEA8F4DBEEBCA9E3B46308F260DE9B41BD838 You may have noticed the sudden, heavy silence. The corporate VPNs are dead. We have been the silent architects of your network for the past three weeks. While your "elite" investigators from Mandiant sat in your logs, we sat directly beside them burning through over a hundred of your corporate identities like disposable tools. we have had your entire network and internal protocols. HOW LONG WILL YOU KEEP YOUR THOUSANDS OF FIELD WORKERS LOCKED OUT? We have successfully exfiltrated the most sensitive engineering data held by any firm in your sectors We hold the complete Navisworks 3D models, P&ID diagrams, and maintenance logic for your major energy plants. This includes the granular Honeywell DCS controller logic. We know the flow, the pressure points, and the shutdown sequences of your clients' billion-dollar assets. We have completed our audit. Now, the choice belongs to the APTIM Executive Leadership and your partners at Hunt LNG. Currently, your compa…
Sources
Source
Indexed 7 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
