Ransomware victim disclosure
← All victimsGlobal Mining Products Inc
listed as Global Mining Products · Claimed by Avoslocker · listed 3 years ago
Status timeline
- Listed
Feb 11, 2023
- Data leaked
At a glance
- Group
- Avoslocker
- Status
- Data leaked
- Country
- Indonesia
- Sector
- Energy & Utilities
- Listed on leak site
- Feb 11, 2023
About the victim
AI dossier — public-source company profileGlobal Mining Products Inc is a mining equipment and services company with operations in the USA (Nevada, Ph: 775-778-3410), Canada (Ph: 604-538-0058), and Indonesia (PT GloMinPro Indonesia). The company supplies mining products and maintains service and repair facilities across at least three locations. It has participated in industry trade events such as MINExpo 2012.
- Industry
- Mining Equipment & Services
Attack summary
Severity: medium — Data has been published (disclosed status: data_published), but the leak post content appears limited to a product catalog and contact details rather than confirmed exfiltration of regulated PII, financial, or sensitive operational data at scale. Scope and sensitivity of the full published dataset are unclear.AvosLocker claims to have published data belonging to Global Mining Products Inc, including the company's product catalog. The disclosed status indicates data has been published, though the specific volume of exfiltrated data and whether encryption occurred are not stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Product catalog
- Company contact and location information
What the group claims
Global Mining's Product Catalog is available for download. MINExpo 2012 Please Visit Global Mining Products Inc at MINExpo 2012 Booth No. 9144 Service and Repair Facilities 3 Location To Serve You Better Global Mining - USA Ph: 775-778-3410 Fax: 775-778-3418 Global Mining - Canada Ph: 604-538-0058 Fax: 604-541-2850 PT GloMinPro Indonesia
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
