RANSOMEDVC Ransomware Group Claims Breach of Sony Corporation

RANSOMEDVC Ransomware Group Claims Breach of Sony Corporation

It is essential to note that these claims by the RANSOMEDVC ransomware gang remain unverified at this point.

The infamous RANSOMEDVC ransomware group claimed to have successfully breached Sony Group Corporation, the Japanese multinational conglomerate giant. This claim was made through listings on both its clearnet and dark web platforms, where the group declared its complete infiltration of all Sony systems.


The ransomware group proclaimed that it had “successfully compromised all of Sony’s systems.” Distinct from the typical ransomware approach of locking the victim’s system, disrupting IT operations, and demanding a ransom for the decryption key, the RANSOMEDVC ransomware group has taken a different method. Instead of ransom demands, the group has declared its intention to monetize the stolen data, citing Sony’s alleged reluctance to comply with their demands.




A screenshot from the RANSOMEDVC Ransomware dark web site displays their claim of breaching Sony Group Corporation (Credit: Hackread.com).

An analysis of the sample data published by RANSOMEDVC on its websites reveals limited insights. Among the leaked files are a PowerPoint Presentation purportedly from Sony’s Quality Assurance Division, internal screenshots displaying what seems to be a Sony workstation, Java files, and more.




The alleged stolen Sony Group Corporation data (Credit: Hackread.com).

It is essential to note that these claims by the RANSOMEDVC ransomware gang remain unverified at this point. Hackread.com has initiated contact with Sony to request an official statement regarding these allegations.

For context, the RANSOMEDVC ransomware group has been operational since at least 2023. They have gained fame for their aggressive tactics, which involve threatening victims with the release of s ..

Support the originator by clicking the read the rest link below.