Ransomware victim disclosure
← All victimsCRIT Tunisie
Claimed by titan · listed 2 days ago
Status timeline
- Listed
May 18, 2026
- Data leaked
At a glance
- Group
- titan
- Status
- Data leaked
- Country
- TN
- Sector
- Business Services
- Listed on leak site
- May 18, 2026
About the victim
AI dossier — public-source company profileCRIT Tunisie is a subsidiary of the French staffing group CRIT, operating in Tunisia. The company provides workforce solutions including temporary employment, permanent recruitment, and outsourcing services across sectors such as industry, logistics, and services. It acts as an intermediary connecting businesses with staffing solutions and job seekers with employment opportunities.
- Industry
- Human Resources & Temporary Staffing
Attack summary
Severity: high — Data has been published (disclosed status: data_published) by the threat actor. Given the company operates in HR and staffing, the exfiltrated data likely contains PII for employees, candidates, and client organisations at meaningful scale, constituting significant sensitive data exposure even absent a stated volume.The Titan ransomware group claims to have published data belonging to CRIT Tunisie, indicating exfiltration has occurred and data has been disclosed. No ransom amount or specific data volume was stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Employee records
- Candidate/job-seeker personal data
- HR and recruitment files
- Client company information
- Outsourcing contracts
Original description
AI-summarised, not from the leak postCRIT Tunisie is a subsidiary of the French group CRIT, operating in the human resources and temporary staffing industry. Based in Tunisia, the company provides workforce solutions including temporary employment, permanent recruitment, and outsourcing services. It serves various sectors such as industry, logistics, and services, helping businesses manage their staffing needs efficiently while connecting job seekers with employment opportunities across the country.
Screenshot of the leak post

Sources
Source
Indexed 2 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
