Ransomware victim disclosure
← All victimsCity of Michigan City, Indiana
listed as michigancityin.gov · Claimed by obscura · listed 7 months ago
Status timeline
- Listed
Oct 13, 2025
- Data leaked
At a glance
- Group
- obscura
- Status
- Data leaked
- Country
- United States
- Sector
- Public Sector
- Listed on leak site
- Oct 13, 2025
- Data size
- 450 GB
About the victim
AI dossier — public-source company profileThe City of Michigan City is the official municipal government of Michigan City, Indiana, USA. It administers a full range of city services including public safety (police, fire, emergency management), infrastructure (water works, sanitary district, streets, airport), community development, parks and recreation, and resident services. As a local government entity, it holds sensitive data on residents, employees, and city operations.
- Industry
- Municipal Government
- Address
- 100 E Michigan Blvd, Michigan City, IN 46360, United States
Attack summary
Severity: critical — 450 GB of data from a municipal government has been confirmed published, almost certainly containing PII of residents and employees, public safety records, and potentially sensitive law enforcement or financial data — all categories of regulated or highly sensitive information at scale.The ransomware group Obscura claims to have exfiltrated 450 GB of data from the City of Michigan City's systems, with the data now published. No ransom amount was stated.
Data the group says was taken
AI dossier — extracted from the leak post- Government administrative records
- Resident personal information
- Employee records
- Public safety records (police, fire, emergency management)
- Financial/controller records
- Planning and zoning documents
- Water works and sanitary district data
- Building permits and inspection records
- Legal/attorney documents
What the group claims
Revenue: ?? | Leak Size: 450 GB | Status: Published
Sources
Source
Indexed 7 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
