iTWire contacted the company on 30 November, using the only email address available on the company's website, and seeking comment by 10am AEDT on 2 December. There has been no response to date, apart from an automated reply which shows the email has reached its intended address.
Most of the information that has been dumped appears to be financial data, with some information relating to leases and others being about technical pre-buy inspections.
SKY says on its website that it has done US$20 billion (A$26.9 billion) worth of aircraft transactions thus far and has raised US$1.5 billion in equity capital from private equity, pensions and institutional capital.
On its site, it says: "The company's team of industry professionals, including executive chairman Rich Wiley and chief executive Austin Wiley, have developed extensive relationships in the international airline community by leasing aircraft to over 200 airline customers globally and executing more than 600 aircraft transactions valued at over US$20 billion.
"Rich and his previous management teams co-founded industry leading aircraft lessors including Pegasus Aviation Finance Company, which was established in 2004 and sold to AWAS in 2007; Jackson Square Aviation, which was established in 2010 and sold to Mitsubishi UFJ Lease & Finance Company in 2012, and Sky Aviation Leasing International, which was established in 2015 and sold to Goshawk Aviation in 2018.
"In October 2019, SKY launched its’ first dedicated aircraft fund, raising $300M of equity from limited partners to invest in new and young midlife aircraft."
The Avaddon ransomware behaves as does other malware of its genre, encrypting data after having first exfiltrated it so that the attackers in question have an additional means of putting pressure on victims to pay up.
As a security source explained: "The ransomware isn't what exfiltrates the data. The attackers get into a network and grab a copy of the data before the ransomware is ever deployed.
"They could do this via a script, via a straightforward copy and paste to a remote server or, if the company has cloud back-ups, they could simply download those.
"Once they've got the data, they'll deploy the ransomware of their choosing: Avaddon, REvil, NetWalker or whatever. What you get depends on who broke into your network."
The tactic of stealing data was first adopted by Maze in November 2019, according to Sophos senior security expert John Shier.
In a blog post earlier this year, he said the tactic had been adopted by other groups such as Ako, Avaddon, Cl0p, DoppelPaymer, Nemty, Nefilim, REvil (Sodinokibi), NetWalker, Pysa (Mespinoza), Ragnar Locker, Sekhmet and Snatch.