PA
Ransomware Victim Manufacturing

palram.com

Ransomware attack by Killsec ยท Disclosed March 17, 2026 ยท ๐Ÿ‡ฎ๐Ÿ‡ฑ Israel

example.com

Date Disclosed
Mar 17, 2026
2026
Threat Group
Killsec
279 total victims
Industry
Manufacturing

Incident Analysis

palram.com was targeted by Killsec ransomware, one of the most active ransomware groups in our database with 279 confirmed victims globally. The attack was disclosed on March 17, 2026, when palram.com appeared on the group's dark web leak site.

palram.com is based in Israel , operating in the Manufacturing sector. Israel ranks #17 globally for ransomware attacks, with 132 victims in our database.

Sector context: Manufacturing companies are frequently targeted because production downtime directly translates to financial loss. Ransomware operators exploit this time-sensitivity to demand higher ransoms and faster payment.

Killsec typically employs a double extortion model: first exfiltrating sensitive data from the victim's systems, then deploying ransomware to encrypt files. Victims face two simultaneous threats โ€” paying to restore access and paying to prevent publication of stolen data. The group's leak site publishes victim names and exfiltrated data as leverage.

Data source: This incident record is sourced from public ransomware group leak site disclosures aggregated via the ransomware.live API. Disclosure date reflects when the victim was published on the leak site, which may differ from the initial date of compromise. This platform does not publish or link to stolen data. Last data update: May 18, 2026 12:01 UTC.

Frequently Asked Questions

Was palram.com attacked by ransomware?

Yes. palram.com was listed as a victim of the Killsec ransomware group on March 17, 2026. The organisation is based in Israel and operates in the Manufacturing sector. The disclosure appeared on the group's dark web leak site.

Which ransomware group attacked palram.com?

palram.com was attacked by Killsec ransomware. Killsec is one of the most active ransomware groups, having claimed 279 victims globally. The group typically employs a double-extortion model: encrypting the victim's files and threatening to publish stolen data.

When did the palram.com ransomware attack occur?

The ransomware attack on palram.com was disclosed on March 17, 2026. This date reflects when the victim was published on the threat group's leak site, which may differ from the actual date of initial compromise.

What data was stolen in the palram.com ransomware attack?

The specific data stolen from palram.com has not been independently verified by this platform. Ransomware groups typically exfiltrate data before encrypting systems and use the threat of publication to pressure victims. As a Manufacturing organisation, palram.com likely held sensitive business data, client information, and operational records.

How can organisations protect against Killsec attacks?

To defend against Killsec and similar threat actors, organisations should: maintain regular offline backups tested for restoration; implement network segmentation to limit lateral movement; deploy multi-factor authentication on all remote access; use endpoint detection and response (EDR) tools; conduct regular phishing and security awareness training; and monitor threat intelligence feeds for indicators of compromise (IOCs) associated with active groups.