World Leaks, a recently rebranded entity of the previously known Hunters International ransomware group, has publicly disclosed a significant breach involving 1.3 TB of internal data, which they assert belongs to Dell Technologies Inc., a prominent American multinational technology firm.
This announcement was made on July 21, 2025, via the group’s designated dark web leak site. Information reviewed by cyber analysts indicates that the leak comprises 416,103 files, all of which are accessible for public download. A substantial number of these documents make direct references to Dell Technologies, aligning with what appears to be genuine internal corporate data.
Analysis of the Leaked Data
A detailed examination of the disclosed files reveals potentially sensitive internal information from Dell Technologies’ global operations. The files originate from various regional systems, including those in the Americas, Europe, and Asia-Pacific, encompassing employee folders, software tools, infrastructure scripts, and backup data.
Furthermore, numerous files reference Dell’s products, such as PowerPath and PowerStore, along with firmware related to Dell-branded hardware. Additional mentions include VMware tools, Terraform automation scripts, as well as files associated with system monitoring and internal testing protocols. This structured data presentation, featuring regular mentions of Dell’s tools, supports the assertion that the files were extracted from the company’s legitimate infrastructures.
Importantly, World Leaks has not clarified when the breach occurred, the methodology behind it, or how Dell Technologies is responding to this situation.
Response from Dell Technologies
In a response to inquiries, Dell confirmed that unauthorized access was gained to its internal “Solution Center,” a secure environment used for product demonstrations and testing activities. The company emphasized that this system operates independently from customer and partner networks and does not impact its primary service infrastructure.
According to Dell, the data accessed is primarily synthetic, publicly available, or pertains to internal scripts and testing results. Though Dell refrained from using the term “breach,” their acknowledgment of unauthorized access suggests a clear security lapse. The company has stated that its investigation remains ongoing.
Understanding World Leaks and Its Origins
World Leaks, as previously reported, is the newly adopted identity of the Hunters International group. This organization has shifted its operational strategy, now concentrating primarily on data theft and extortion as opposed to ransomware deployment. Their method involves stealing sensitive information and coercing victims to pay to prevent public disclosure of the stolen data.
This strategic pivot marks a departure from the original Hunters International model, which involved both encryption of files and extortion. By eliminating encryption, World Leaks is betting on the pressure generated by the threat of public exposure, which reduces the risk of detection by law enforcement.
The group employs a custom-built exfiltration tool designed to extract substantial volumes of data from compromised networks, indicative of an advanced upgrade from previous iterations used by affiliates of the original Hunters International group.
Dell’s History with Cybersecurity Breaches
Given its scale, Dell remains an attractive target for cybercriminals, and this incident is not the first involving alleged breaches of its systems. For example, in May 2024, a hacker using the alias “Menelik” claimed to sell data from approximately 49 million Dell customer accounts. Dell confirmed this breach shortly thereafter but minimized its potential impact, asserting that the compromised data did not pose a significant risk.
Moreover, in September 2024, another hacker, known as “grep,” disclosed three separate breaches involving Dell, one of which exposed data linked to over 10,000 Dell employees. These recurrent incidents highlight ongoing cybersecurity vulnerabilities within the organization.