Ransomware victim disclosure
← All victimsearthsystems.com.au earthsystemseurope.com
Claimed by incransom · listed 13 days ago
Status timeline
- Listed
May 8, 2026
- Data leaked
At a glance
- Group
- incransom
- Status
- Data leaked
- Country
- AU
- Sector
- Business Services
- Listed on leak site
- May 8, 2026
About the victim
AI dossier — public-source company profileEarth Systems is an Australian environmental and social science and engineering company established in 1993, headquartered in Port Melbourne, Victoria, with additional offices in Bristol, Hanoi, Dakar, Melbourne, Rwanda, Shanghai, Vientiane, and Côte d'Ivoire. The company delivers services in environmental and social impact assessment, water management and treatment, ecology, energy and carbon efficiency, and sustainability across sectors including mining, energy, oil and gas, infrastructure, and international development. It operates globally, having completed projects in Australia, Asia, Africa, North America, and the Pacific.
- Industry
- Environmental & Social Science Consulting and Engineering
- Address
- 4/290 Salmon Street, Port Melbourne, VIC 3207, Australia
- Founded
- 1993
Attack summary
Severity: high — Data is confirmed as published and includes sensitive business documents such as NDAs, client contracts, and project data. Earth Systems works with international development organisations, government bodies, and major industry clients, meaning exfiltrated data likely contains commercially sensitive and potentially regulated information at significant scale.The incransom group claims to have exfiltrated full corporate data including NDAs, client contracts, and project files from Earth Systems, with the disclosure status recorded as data_published.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate data
- NDA documents
- Client contracts
- Project files
What the group claims
full corp data nda client contract project
Sources
Source
Indexed 13 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
