Ransomware victim disclosure
← All victimsCOMPASS INFRASTRUCTURE GROUP
Claimed by Mallox · listed 3 years ago
Status timeline
- Listed
Jun 27, 2023
- Data leaked
At a glance
- Group
- Mallox
- Status
- Data leaked
- Country
- United Kingdom
- Sector
- Construction
- Listed on leak site
- Jun 27, 2023
- Ransom demanded
- $7
About the victim
AI dossier — public-source company profileCompass Infrastructure Group, LLC is a civil engineering design firm based in Columbus, Ohio, providing bridge, roadway, traffic, and survey services across Ohio and Kentucky. The company offers civil engineering design and project management services and operates across multiple project locations in the region.
- Industry
- Civil Engineering & Infrastructure Design
- Address
- Columbus, Ohio, United States
Attack summary
Severity: high — Data has been confirmed published (disclosed status: data_published) across three archive files, indicating actual exfiltration and full public release of company data. While the sector is civil engineering rather than healthcare or government, engineering design data (bridge, roadway, infrastructure plans, project management records) can be sensitive and the publication is complete rather than a mere listing.Mallox claims to have exfiltrated data from Compass Infrastructure Group and has published the data in three password-protected archive files (COMPASS.7z.001–003) via AnonFiles links, indicating full data publication rather than a ransom negotiation stage.
Data the group says was taken
AI dossier — extracted from the leak post- COMPASS.7z.001 archive
- COMPASS.7z.002 archive
- COMPASS.7z.003 archive
The group's post references roughly 3 proof files.
What the group claims
DATA: COMPASS.7z.001 https://anonfiles.com/34xeP5y9z4/COMPASS_7z_001COMPASS.7z.002 https://anonfiles.com/lav9P7ycz1/COMPASS_7z_002COMPASS.7z.003 https://anonfiles.com/Ebu4P0yaz2/COMPASS_7z_003 PASSWORD: he?A!xl_<90!T9O>5a3KC5;h^*$7pjpZ
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
