Discovered
2025-07-22
Est. attack date
2025-07-14
Country
Description:
We have exfiltrated over 300GB of most sensitive and business-critical data from internal servers including full DBs including Microsoft Dynamics GP database, financials, accounting records, HR files, inventory logs, production processes, customer contracts, and complaint records, complete data analytics and marketing materials.And also have R&D and QC datasets, such as HPLC/FASE MOVIL outputs, experimental protocols, specialized pharmaceutical formulations, master batch records detailing proprietary production know-how, ANMAT/FDA CTDs, product recall logs, GMP audit results, deviation reports, and regulatory correspondence.
DNS Records:
The following DNS records were found for the victim's domain.
- mailbkup.cylarcom.net.
- mail.cylarcom.net.
- mailbkup2.cylarcom.net.
- mail0.cylarcom.net.
- brevo-code:8fe81d62fccdfa6e8ad52b3093f93bfc
- v=spf1 a include:_spf.cylarcom.net include:_spf.connectingonline.com.ar ~all
Cloud / SaaS Services Detected
No well-known cloud or SaaS service detected.
Legal Disclaimer:
Ransomware.live does not engage in the acquisition, exfiltration, downloading, possession,
hosting, access, consultation, redistribution, or disclosure of unlawfully obtained data.
This platform indexes only publicly visible information posted by ransomware operators and
open web sources without accessing or obtaining the underlying stolen content.
The service is provided to support public awareness, legitimate research, and cyber-resilience.
No stolen personal or confidential data is collected or distributed via this site.