Ransomware victim disclosure
← All victimsMaroc Telecom
listed as iam.ma · Claimed by apt73 · listed 23 days ago
Status timeline
- Listed
Apr 27, 2026
- Data leaked
At a glance
- Group
- apt73
- Status
- Data leaked
- Country
- MA
- Sector
- Technology
- Listed on leak site
- Apr 27, 2026
About the victim
AI dossier — public-source company profileMaroc Telecom (Itissalat Al-Maghrib) is the leading telecommunications operator in Morocco, providing mobile, fixed-line, internet, and television services. It operates across Morocco and has a significant presence in sub-Saharan Africa through subsidiaries in multiple countries. The company is majority-owned by Etisalat (e&) and is listed on the Casablanca and Paris stock exchanges.
- Industry
- Telecommunications
- Address
- Avenue Annakhil, Hay Riad, Rabat, Morocco
- Employees
- 10000+
- Founded
- 1998
Attack summary
Severity: critical — Maroc Telecom is a major national telecommunications operator serving millions of subscribers; a confirmed data publication by a ransomware group against such an entity strongly implies large-scale PII exposure (subscriber records, communications data) constituting regulated and sensitive data at scale.The group apt73 claims to have attacked Maroc Telecom and published data, with the disclosure status indicating data has been published. The leak post describes the company as a telecommunications provider but the post is truncated, leaving the full scope of exfiltrated data and any encryption claims unclear.
Data the group says was taken
AI dossier — extracted from the leak post- Telecommunications customer data
- Internal company documents
- Potentially subscriber PII
What the group claims
Maroc Telecom is a telecommunications company in Morocco that provides mobile communications, Int...
Sources
Source
Indexed 23 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
