Ransomware victim disclosure
← All victimsGrupo 55 Correduría de Seguros
listed as grupo55.com · Claimed by m3rx · listed 4 days ago
Status timeline
- Listed
May 17, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileGrupo 55 Correduría de Seguros is a Spanish insurance brokerage firm based in Alcalá de Henares, Madrid. The company offers insurance products and services to clients, focusing on tailored solutions and professional service quality. Their website copyright dates to 2019, suggesting an established operation of modest scale.
- Industry
- Insurance Brokerage
- Address
- Paseo de Pastrana, 1, 28803 Alcalá de Henares, Madrid, Spain
Attack summary
Severity: high — As an insurance brokerage, the company almost certainly holds regulated personal and financial data (policyholder PII, financial records, insurance contracts). The disclosed status is 'data_published', confirming exfiltration rather than a mere listing, raising severity; however, the absence of explicit data inventory details or confirmed scale prevents a 'critical' rating.The m3rx ransomware group claims to have exfiltrated data from Grupo 55 Correduría de Seguros and has published it, inviting interested parties to contact them via Tox for access to the stolen data.
Data the group says was taken
AI dossier — extracted from the leak post- Unspecified exfiltrated company data
What the group claims
+34 918 892 727. Founded in 1996, Grupo 55 Correduría de Seguros leverages decades of professional expertise and a highly qualified team to deliver personalized, top-tier insurance solutions. Collaborating closely with a strong network of partners, the company continuously enhances its service quality to outperform competitors and ensure maximum solvency for its clients. Stolen: 178gb 166k files
The leak post
captured from the group's siteIf you are interested in this data, please contact our support.Tox: 9A1217BEDA4AB77052A25D17CB6FFB34AFA2BE462E607F2FD8E1DF1DDD4CA16A64E18B1A0BF2
Sources
Source
Indexed 4 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
