Ransomware victim disclosure
← All victimsMarjane Group
Claimed by Stormous · listed 2 months ago
Status timeline
- Listed
Mar 28, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileMarjane Group is a Moroccan retail conglomerate that owns and operates the Marjane hypermarket chain and Marjane Market supermarkets. Founded in 1990, it has grown to become the largest retail company in Morocco. The group operates a network of large-format stores across the country serving the general consumer market.
- Industry
- Retail – Hypermarkets & Supermarkets
- Founded
- 1990
Attack summary
Severity: high — 33 GB of data is confirmed published (data_published status), including customer PII, scanned identity documents, employee records, and financial data, representing significant exfiltration of sensitive personal and corporate information from a major national retailer.Stormous claims to have exfiltrated 33 GB of data from Marjane Group via stealer-type breach using valid credentials, with the data now published. The claimed dataset includes customer PII, employee records, internal corporate documentation, and administrative/system data.
Data the group says was taken
AI dossier — extracted from the leak post- Customer personally identifiable information (names, emails, phone numbers)
- Employee and personnel records
- CVs and HR documents
- Internal corporate documentation
- Administrative and system data
- Partner data
- Financial documents
- Scanned ID documents (passports, national IDs)
- Bank and payment records
- Internal emails
What the group claims
Stealer-type breach with valid credentials and sensitive access
The leak post
captured from the group's siteInitial Access Brokers - Long-Term Collaboration We are currently seeking reliable Initial Access Brokers for long-term collaboration. ** Please do not waste time attempting complex exploit development or direct EDR confrontation. We are interested exclusively in stable corporate access. Local user access is acceptable. * Small to mid-sized enterprises: fixed payment starting at * Large enterprises: revenue share from final settlement FANASA.COM Half the data has been extracted Personally Identifiable Information (PII), Electronic Fiscal Documents (CFDI/XML), Financial Transaction Records, Commercial Invoices & Billing Data, Taxpayer Identification Numbers (RFC), Client & Vendor Database/Internal Corporate Documentation Administrative/System Files/ADMIN, DOAS, operational records, engineering drawings, schematics... Project Planning & Execution Documents... (Folders/Files) Email/Communication/System/Application Data AYEAPLICACIONES database/Log Data BDATOSFITCLOD, Software/Installation/Program Files AUTOBOU, Personal/Miscellaneous Files AvenaCubana All of this data is offered for sale (user information: email, phone number, full name, date of birth / payment and bookin…
Data the group says was taken
- passwords
Sources
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
