Ransomware victim disclosure
← All victimsMICA ENVIRONNEMENT
Claimed by Mallox · listed 3 years ago
Status timeline
- Listed
Jun 20, 2023
- Data leaked
At a glance
- Group
- Mallox
- Status
- Data leaked
- Country
- France
- Sector
- Consulting
- Listed on leak site
- Jun 20, 2023
About the victim
AI dossier — public-source company profileMica Environnement is an independent French engineering consultancy specialising in geology, geotechnics, hydrogeology, hydrology, landscape, and natural environment studies. The firm serves sectors including mining, geothermal energy, quarries, renewable energies, waste storage, and explosive product installations. It offers multidisciplinary expertise and project management services including site rehabilitation, ecological restoration, and environmental monitoring.
- Industry
- Environmental Engineering & Geosciences Consulting
Attack summary
Severity: high — Data has been fully published across 15 archive files, confirming exfiltration and public disclosure of what are likely significant business, project, and client-related documents from an environmental engineering firm. The disclosure status is 'data_published', representing confirmed exfiltration with active data release.The Mallox ransomware group claims to have exfiltrated data from Mica Environnement and has published the stolen data across 15 password-protected archive parts (Mica.7z.001–015) hosted on AnonFiles. No ransom amount was stated and no encryption claim was explicitly made in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Business/project files (inferred from archive volume)
- Internal company documents
- Potentially environmental study reports
- Employee and client records (inferred)
The group's post references roughly 15 proof files.
What the group claims
DATA PARTS: Mica.7z.001 https://anonfiles.com/Qat8K6x8zf/Mica_7z_001 Mica.7z.002 https://anonfiles.com/P6t7K0xcz0/Mica_7z_002 Mica.7z.003 https://anonfiles.com/u4s2K7xaz3/Mica_7z_003 Mica.7z.004 https://anonfiles.com/R1tfK5xezc/Mica_7z_004 Mica.7z.005 https://anonfiles.com/f2t9K8xdzc/Mica_7z_005 Mica.7z.006 https://anonfiles.com/JdudK4x7z6/Mica_7z_006 Mica.7z.007 https://anonfiles.com/N9ueK6xbz4/Mica_7z_007 Mica.7z.008 https://anonfiles.com/zcw2Kcxbz8/Mica_7z_008 Mica.7z.009 https://anonfiles.com/16w5Kbx1zd/Mica_7z_009 Mica.7z.010 https://anonfiles.com/22w7K5xeze/Mica_7z_010 Mica.7z.011 https://anonfiles.com/09w8Kcxdz6/Mica_7z_011 Mica.7z.012 https://anonfiles.com/30w4Kaxcza/Mica_7z_012 Mica.7z.013 https://anonfiles.com/59z4K5x7z2/Mica_7z_013 Mica.7z.014 https://anonfiles.com/wez5K7x2z4/Mica_7z_014 Mica.7z.015: https://anonfiles.com/i7z0Kbx8z8/Mica_7z_015 PASSWORD: 9n?M)YLZ737Fr5ttZ7u$YU01j<4&5ZrW
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
