Ransomware victim disclosure
← All victimsFrance Travail (French Public Employment Service)
listed as French Government · Claimed by Stormous · listed 7 months ago
Status timeline
- Listed
Oct 27, 2025
- Data leaked
At a glance
- Group
- Stormous
- Status
- Data leaked
- Country
- France
- Sector
- Public Sector
- Listed on leak site
- Oct 27, 2025
- Data size
- 33 GB
- Ransom demanded
- $900
About the victim
AI dossier — public-source company profileFrance Travail (formerly Pôle emploi) is the French public employment agency responsible for registering unemployed individuals, facilitating job placement, and managing unemployment benefits across France. It operates under the French government and serves millions of job seekers and employers nationwide. The agency holds extensive personal, financial, and employment-related data on a large portion of the French working population.
- Industry
- Public Employment Services / Government Agency
Attack summary
Severity: critical — Confirmed exfiltration of regulated PII at scale from a national government employment agency, including identity documents, banking details, tax records, social security data, and plaintext credentials affecting a large portion of the French working population.The Stormous group claims to have exfiltrated 33 GB of data from France Travail, publishing it as a full data dump. The stolen data allegedly includes plaintext authentication credentials, personal identity information, employment history, tax documents, social security attestations, and work authorization documents.
Data the group says was taken
AI dossier — extracted from the leak post- Plaintext authentication credentials (usernames/passwords)
- Full names and dates of birth
- Gender information
- Addresses, phone numbers, email addresses
- Employment history and professional skills
- National identity card (CNI) data
- Bank account details (RIB)
- Employment contract types (CDD, CDI, temporary missions)
- Tax documents
- Social security attestations
- Training certificates
- Work authorization documents
What the group claims
Stealer-type breach Valid credentials, sensitive access
The leak post
captured from the group's siteams-group.co.uk FULL DATA DUMP 33GB ams-group.co.uk FULL DATA DUMP 33GB The extracted data comprises administrative and financial records, payroll sheets, and client and partner directories, alongside technical and engineering specifications, employee records, and business plans. It also includes architectural designs, official contracts, detailed engineering reports, and construction site maps, as well as risk assessments, internal correspondence, and tax and legal information. We releasing the databases of CGCSA.CO.ZA (Consumer Goods Council of South Africa) for free. This comes after the company failed to reach a resolution and publicly denied the breach.The total size is 20 GB and includes.Full Reports CustomerData (thousands of clients) Scripts & Statements Invoices & CEO Reports TCS CGCSA & CGCSA ACC BACKUP SAGE200EVOSQL CGCSA FULL The data has been uploaded to Mega https://mega.nz/folder/siwUDQbL#-c-tWl8fW8zy1tcmEzoUhw $900k to Solve the Problem 5TB — While TTT Company was preoccupied with designing luxurious interiors and architectural masterpieces, they completely overlooked the design of a secure network. We have spent enough time within their internal infrastructure to c…
Source
Indexed 7 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
