Ransomware victim disclosure
← All victimsMS Groupe
listed as axxia.fr · Claimed by Braincipher · listed 7 months ago
Status timeline
- Listed
Oct 29, 2025
- Data leaked
At a glance
- Group
- Braincipher
- Status
- Data leaked
- Country
- France
- Sector
- Technology
- Listed on leak site
- Oct 29, 2025
About the victim
AI dossier — public-source company profileMS Groupe is a French multi-brand automotive dealership group operating numerous concessions across several regions of France, including Paris, Le Mans, Tours, Blois, Orléans, Melun, Auxerre, and Sens. The group sells and services BMW, MINI, BMW Motorrad, and Honda motorcycles under branded sub-dealerships (Amplitude, Panel, Dupont, Dream Moto). It operates a significant retail and after-sales network spanning at least a dozen locations.
- Industry
- Automotive Dealership Group (BMW, MINI, Honda)
- Address
- 2 Boulevard René Cassin, 72000 Le Mans, France
Attack summary
Severity: high — Over 1 TB of data has been publicly published across multiple Tor mirrors (disclosed/data_published status), indicating confirmed and completed exfiltration of significant business data from a multi-location automotive retail group. The volume and publication strongly suggest sensitive operational, customer, and/or financial records are exposed.Braincipher claims to have exfiltrated more than 1 TB of data from MS Groupe and has published download links across at least ten Tor onion addresses, indicating the data has been fully released. No encryption claim is explicitly stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Exfiltrated company data (>1 TB, unspecified contents)
- Files accessible via multiple Tor download mirrors
The group's post references roughly 10 proof files.
Original description
AI-summarised, not from the leak postN/A
The leak post
captured from the group's siteWe have more 1TB of data. If you think you are here by mistake, please contact us at [email protected] ⏳ 11d 22h 39m 6s remaining Download: 3fg2gfwrdks46drwvejpgpak5klrflclsjjo35dxtqfk3poeez6oezad.onion If you think you are here by mistake, please contact us at [email protected] Download: emdnfl2fv32jhssxcbxlo6dzg2at4d7qbw2md6inz63qzdfgyln5cwyd.onion If you think you are here by mistake, please contact us at [email protected] Download: a4vbe7yp4kluped6khuhpr5nmzshiimx2jt5j22ozriiq6ngsm3fcpyd.onion If you think you are here by mistake, please contact us at [email protected] Download: x3nb7qcygpem2j5xzstyzdtgzofzkwkx4eko3ug4r73i6uhcgvyffjyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 3frnhzcnlkjnw5q3tm6elzizinm2k3bmrtf2xwqjzpcxzeqwn2tv6wyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 6ft2dfh26wm3w44orpjcgviutvfp25ez2iyh5ego5egvfmifrws7vvqd.onion If you think you are here by mistake, please contact us at [email protected] Download: zijgmuqjzb6dc7pofxhtaiz36qqyg35lhutybmzaz6whzgei2casjgid.onion If you think…
Sources
Source
Indexed 7 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
