Ransomware victim disclosure
← All victimsSASP SNCC AUTOMATISME SOLUTIONS PROCESS
Claimed by crypto24 · listed 5 months ago
Status timeline
- Listed
Dec 17, 2025
- Data leaked
At a glance
- Group
- crypto24
- Status
- Data leaked
- Country
- France
- Sector
- Technology
- Listed on leak site
- Dec 17, 2025
About the victim
AI dossier — public-source company profileSASP is a French company headquartered near Le Havre in Normandy, specialising in industrial IT, automation (PLC/SCADA/DCS/SNCC), and OT network cybersecurity. With nearly 50 employees and over 20 years of experience, it serves clients across petrochemicals, pharmaceuticals, renewable energy, agri-food, paper, and automotive sectors throughout France. The company holds MASE certification and provides project, maintenance, and on-call support services.
- Industry
- Industrial Automation & OT Cybersecurity
- Address
- Saint-Romain-de-Colbosc (76), Normandie, France
- Employees
- ~50
Attack summary
Severity: high — SASP provides industrial automation, SCADA/DCS integration, and OT cybersecurity services to critical-infrastructure sectors including petrochemicals, pharmaceuticals, and energy. A confirmed data publication by the threat actor against such an OT-focused integrator poses significant supply-chain and critical-infrastructure risk, even without explicit detail on the data volume, warranting a high severity rating.The ransomware group crypto24 claims to have compromised SASP and lists the incident as 'data_published', indicating that data has been released or is available. The leak post body is empty, so specific claims about encryption or exfiltration volumes cannot be verified from the post alone.
What the group claims
***
Sources
- Victim sitewww.sasp.fr
Source
Indexed 5 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
