Ransomware victim disclosure
← All victimscc***.or.*z
Claimed by benzona · listed 4 months ago
Status timeline
- Listed
Jan 12, 2026
- Data leaked
At a glance
- Group
- benzona
- Status
- Data leaked
- Country
- New Zealand
- Sector
- Not Found
- Listed on leak site
- Jan 12, 2026
About the victim
AI dossier — public-source company profileThe victim is identified only by the partially redacted domain 'cc***.or.*z' registered in New Zealand (the '.or.nz' second-level domain suggests a non-profit or community organisation). No public site content or leak post details are available to determine the organisation's nature or activities.
Attack summary
Severity: medium — Data is reported as published ('data_published' status) indicating at least some exfiltration occurred, but the absence of any leak post content, data size, or proof details prevents confirmation of scale or sensitivity, warranting a medium rating rather than high or critical.The group 'benzona' has listed this organisation with a disclosed status of 'data_published', implying data has been exfiltrated and released; however, no leak post content is available to confirm specific claims about encryption, exfiltration scope, or data categories.
Sources
- Victim sitecc***.or.*z
Source
Indexed 4 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
