2024-12-26 |
Car Care Plan - Data Breach |
Car Care Plan is a leading provider of Warranty, Asset Protection, Cosmetic Repair Insurance, Alloy Wheel Repair Insurance, Tyre Insurance, Roadside Assistance, and MOT test programmes. The company has over 40 years of industry experience and holds relationships with over 20 major manufacturers along with over 3,000 independent and group car retailers across 26 territories worldwide. Through these relationships, Car Care Plan offers an array of award-winning products and administers over 1,000,000 policies annually with a team of over 400 employees.
We have successfully stolen over 50 GB of data, including the following:
All the data has been encrypted, and without our decryption key, it is nearly impossible to decrypt the files.
Failure to pay the ransom before the deadline will result in the data being publicly released.
|
|
2024-12-25 |
Sistem Informasi Pengelolaan Keuangan Daerah (SIPKD) - Blora Regency |
The e-Finance system of Blora Regency, known as the Sistem Informasi Pengelolaan Keuangan Daerah (SIPKD) (English Translation: Regional Financial Management Information System), is an integrated, online, real-time platform designed to manage regional financial administration. It is managed by the Badan Pendapatan, Pengelolaan Keuangan, dan Aset Daerah (BPPKAD), which translates to the Regional Revenue, Finance, and Asset Management Agency of Blora Regency.
We have successfully stolen 82 GB of data, including backups, spanning from 2018 to the present. This data includes:
Failure to pay the ransom before the deadline will result in the data being sold or publicly released.
|
|
2024-11-15 |
Pinger - USA |
We have successfully breached Pinger’s infrastructure, acquiring 111 GB of highly sensitive data. This includes over 9 million user records, private messages, voice messages, internal tools (such as phone number lookup and notification sender), backend systems, and source codes.
Pinger, a global leader in free texting and calling solutions with millions of active users, is now at risk of having its proprietary data and user information exposed, potentially causing significant reputational and operational damage.
To secure the deletion of this data and prevent its public release, we demand a payment of $150,000 USD in Monero (XMR) or Bitcoin (BTC). Failure to comply will result in the immediate dissemination of the compromised information.
|
|
2024-11-04 |
College of Business - Tanzania |
We have successfully accessed and compromised over 500,000 student records from the College of Business Education in Tanzania. This leak includes a substantial amount of personally identifiable information (PII), such as full names, phone numbers, and email addresses. Additionally, the records may contain billing and financial information.
You can now download the full Database.
|
|
2024-11-04 |
Ministry of Education - Jordan |
We have successfully accessed and compromised a range of sensitive documents from Jordan's Ministry of Education. This includes images of identification cards, divorce papers, and various letters addressed to the Minister.
You can now download the full dataset.
|
|
2024-11-04 |
Schneider Electric - France |
We have successfully breached Schneider Electric’s infrastructure, accessing their Atlassian Jira system.
This breach has compromised critical data, including projects, issues, and plugins, along with over 400,000 rows of user data, totaling more than 40GB Compressed Data.
Schneider Electric, a leader in energy management and automation with annual revenue exceeding $40 billion, is now at risk of exposing sensitive customer and operational information.
To secure the deletion of this data and prevent its public release, we require a payment of $125,000 USD in Baguettes. Failure to meet this demand will result in the dissemination of the compromised information.
Stating this breach will decrease the ransom by 50%, its your choice Olivier...
|
|
2024-11-04 |
Contact us |
Do you have any questions? Was your company breached or locked by us? Never hesitate to contact us.
You can find our PGP key here.
Signed onion address: Hidden Service.
|
|
2024-10-25 |
??? |
??????????
Wait for us ... #HELLCAT
|
|
2024-10-25 |
The Knesset - Israel |
Using exposed authentication keys, we successfully accessed 45GB of sensitive data from the Knesset's internal systems. The compromised data includes confidential documents, internal communications, and various classified information.
Ransom Demand:$200,000
To prevent the public release of this data, we require a payment of $200,000 in Monero. If the demand is not met, the full dataset will be disclosed.
You can download a sample of 1.94 GB from Knesset Meeting Protocols here:
|
|
2024-10-25 |
Who are we? |
We are the #HELLCAT group, a ... Nothing.
You can find our PGP key here.
Signed onion address: Hidden Service.
|
|