Ransomware victim disclosure
← All victimsAMS Group
Claimed by Stormous · listed 9 days ago
Status timeline
- Listed
May 12, 2026
- Data leaked
At a glance
- Group
- Stormous
- Status
- Data leaked
- Country
- United Kingdom
- Sector
- Business Services
- Listed on leak site
- May 12, 2026
- Data size
- 33GB
About the victim
AI dossier — public-source company profileAMS (Avon Material Supplies Ltd) is a leading materials supply and recycling company based in Dorset, UK, operating since 1993. The company provides aggregates, ready-mixed concrete, skip hire, grab lorry hire, waste collection, and waste disposal services to individuals and businesses across Dorset, Somerset, and surrounding areas. It operates multiple licensed disposal and recycling sites including facilities at Wimborne, Weymouth, and other locations in the region.
- Industry
- Waste Management & Construction Materials Supply
- Address
- Canford Recycling Centre, Wimborne, Dorset, United Kingdom
- Founded
- 1993
Attack summary
Severity: high — 33GB of data has been fully published (disclosed status: data_published), including payroll sheets, employee records, client/partner directories, financial records, and legal/tax documents. This constitutes confirmed exfiltration of significant business data including employee PII (payroll) and sensitive commercial information, warranting a high severity rating.Stormous claims to have exfiltrated 33GB of data from AMS Group and has published it in full. The disclosed data includes administrative and financial records, payroll sheets, client and partner directories, employee records, technical and engineering specifications, architectural designs, contracts, engineering reports, construction site maps, risk assessments, internal correspondence, and tax and legal information.
Data the group says was taken
AI dossier — extracted from the leak post- Administrative records
- Financial records
- Payroll sheets
- Client and partner directories
- Employee records
- Technical and engineering specifications
- Architectural designs
- Official contracts
- Detailed engineering reports
- Construction site maps
- Risk assessments
- Internal correspondence
- Tax information
- Legal information
- Business plans
What the group claims
The extracted data comprises administrative and financial records, payroll sheets, and client and partner directories, alongside technical and engineering specifications, employee records, and business plans. It also includes architectural designs, official contracts, detailed engineering reports, and construction site maps, as well as risk assessments, internal correspondence, and tax and legal information.
The leak post
captured from the group's siteams-group.co.uk FULL DATA DUMP 33GB ams-group.co.uk FULL DATA DUMP 33GB The extracted data comprises administrative and financial records, payroll sheets, and client and partner directories, alongside technical and engineering specifications, employee records, and business plans. It also includes architectural designs, official contracts, detailed engineering reports, and construction site maps, as well as risk assessments, internal correspondence, and tax and legal information. We releasing the databases of CGCSA.CO.ZA (Consumer Goods Council of South Africa) for free. This comes after the company failed to reach a resolution and publicly denied the breach.The total size is 20 GB and includes.Full Reports CustomerData (thousands of clients) Scripts & Statements Invoices & CEO Reports TCS CGCSA & CGCSA ACC BACKUP SAGE200EVOSQL CGCSA FULL The data has been uploaded to Mega https://mega.nz/folder/siwUDQbL#-c-tWl8fW8zy1tcmEzoUhw $900k to Solve the Problem 5TB — While TTT Company was preoccupied with designing luxurious interiors and architectural masterpieces, they completely overlooked the design of a secure network. We have spent enough time within their internal infrastructure to c…
Data the group says was taken
- administrative records
- financial records
- payroll sheets
- client directories
- partner directories
- technical specifications
- engineering specifications
- employee records
- business plans
- architectural designs
- contracts
- engineering reports
- construction site maps
- risk assessments
- internal correspondence
- tax information
- legal information
Sources
Source
Indexed 9 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
