Ransomware victim disclosure
← All victimsPetro-Diamond (petrodiamond.com) - subsidiary of Mitsubishi Corporation
Claimed by Projectrelic · listed 8 months ago
Status timeline
- Listed
Sep 29, 2025
- Data leaked
At a glance
- Group
- Projectrelic
- Status
- Data leaked
- Country
- Japan
- Sector
- Energy
- Listed on leak site
- Sep 29, 2025
About the victim
AI dossier — public-source company profilePetro-Diamond is a commodity trading subsidiary of Mitsubishi Corporation engaged in the trade and marketing of petroleum and its derivatives, liquefied petroleum gas (LPG), and carbon-related materials. The company also handles petrochemicals and participates in energy project development. As a Mitsubishi Corporation subsidiary, it operates within Japan's major integrated trading conglomerate structure.
- Industry
- Petroleum & Commodity Trading
Attack summary
Severity: high — Data has been published by the threat actor against a subsidiary of a major multinational corporation (Mitsubishi Corporation) operating in the energy and petroleum trading sector, which is considered critical infrastructure-adjacent; even without explicit data inventory details, confirmed data publication from a significant energy trading entity warrants a high severity rating.The Projectrelic ransomware group claims an attack on Petro-Diamond and has disclosed data (status: data_published), though the leak post provides no explicit detail on whether encryption, exfiltration, or both occurred, and no data volume or specific file inventory is described.
Original description
AI-summarised, not from the leak postPetro-Diamond is a commodity trading subsidiary of Mitsubishi Corporation. It's involved in the trade and marketing of petroleum and its derivatives, liquefied petroleum gas (LPG), and carbon-related materials. Also, they handle petrochemicals and participate in energy project developments.
Sources
- Victim sitepetrodiamond.com
Source
Indexed 8 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
