Ransomware victim disclosure
← All victimsGrans Magatzems Pyrénées
listed as Pyrénées · Claimed by Akira · listed 2 months ago
Status timeline
- Listed
Mar 18, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileGrans Magatzems Pyrénées is a major department store based in Andorra la Vella, Andorra. It offers a broad range of products and services spanning food, fashion, sports, technology, dining, travel agency services, and financial solutions. It is one of the largest retail establishments in Andorra, serving both local residents and tourists.
- Industry
- Department Store Retail
- Address
- Av. Meritxell, 11, Andorra la Vella, Andorra
- Employees
- 201-500
Attack summary
Severity: critical — The claimed exfiltration includes government-issued identity documents (passports, driving licences) and HR/client PII at scale (263 GB), constituting regulated personal data exposure affecting employees and clients, meeting the critical threshold.Akira claims to have exfiltrated 263 GB of corporate data, including employee passports and driving licences, HR forms, financial records, client information, contracts, agreements, and NDAs, with publication of the data imminent.
Data the group says was taken
AI dossier — extracted from the leak post- Employee passports
- Employee driving licences
- HR forms
- Financial records
- Client information
- Contracts and agreements
- NDAs
What the group claims
Grans Magatzems Pyrénées Andorra offers a wide range of high-qual ity products and services, including food, fashion, sports, and t echnology. Their offerings encompass gourmet food, online shoppin g, and various dining options, as well as travel agency services and financial solutions. We will upload 263gb of corporate data soon. Employee passports a nd DLs, HR forms, financials, client information, lots of contrac ts and agreements, NDAs, and a lot of other interesting files.
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
