Ransomware victim disclosure
← All victimsNerim
Claimed by Vicesociety · listed 3 years ago
Status timeline
- Listed
Jun 4, 2023
- Data leaked
At a glance
- Group
- Vicesociety
- Status
- Data leaked
- Country
- France
- Sector
- Telecommunications
- Listed on leak site
- Jun 4, 2023
About the victim
AI dossier — public-source company profileNerim is a full-service telecommunications operator based in France that has served SMBs and local government entities since 1999. The company provides broadband connectivity, enterprise telephony, server hosting, and network security services. Its customer base spans small and medium-sized businesses as well as public-sector clients.
- Industry
- Telecommunications & Managed IT Services
- Employees
- 51-200
- Founded
- 1999
Attack summary
Severity: critical — Data has been confirmed published by the threat actor. Nerim serves local government entities and SMBs with hosting, telephony, and network security services, meaning exfiltrated data likely includes regulated PII, government communications, and sensitive infrastructure details at scale — consistent with a critical severity classification.Vice Society claims to have attacked Nerim and has published data (disclosed status: data_published), indicating exfiltration of company and potentially client data. No ransom amount was stated and the exact volume of exfiltrated data was not specified in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Business client records
- Local government client data
- Network infrastructure information
- Hosted server data
- Telephony configuration and records
- Internal company documents
What the group claims
Nerim is a full service operator fulfilling the full range of communications needs of SMBs and local government since 1999. Nerim offers broadband connectivity, enterprise telephony, server hosting and network security services.
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
