Ransomware victim disclosure
← All victimsTrinity Exploration and Production
Claimed by Royal · listed 3 years ago
Status timeline
- Listed
May 22, 2023
- Data leaked
At a glance
- Group
- Royal
- Status
- Data leaked
- Country
- Trinidad and Tobago
- Sector
- Energy & Utilities
- Listed on leak site
- May 22, 2023
- Data size
- 54 GB
About the victim
AI dossier — public-source company profileTrinity Exploration & Production plc is an independent oil company headquartered in Trinidad and Tobago that engages in the exploration, development, production, and sale of crude oil. The company operates exclusively within Trinidad and Tobago, focusing on onshore and offshore assets. It is publicly listed and is one of the country's independent upstream hydrocarbon operators.
- Industry
- Oil Exploration & Production
- Address
- 5C Albion Court, Albion Street, Port of Spain, Trinidad and Tobago
- Employees
- 51-200
- Founded
- 2010
Attack summary
Severity: high — 54 GB of data has been confirmed exfiltrated and published from a publicly listed oil exploration and production company, representing significant business, operational, and potentially regulated data exposure in a critical energy sector; no medical or large-scale consumer PII evidence prevents a critical rating.The Royal ransomware group claims to have exfiltrated 54 GB of data from Trinity Exploration & Production plc and has published the data, indicating both exfiltration and likely encryption occurred. No ransom amount was stated and the disclosed status is data_published.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate financial records
- Operational/production data
- Employee personal information
- Contracts and agreements
- Engineering and geological data
- Internal communications
What the group claims
Trinity Exploration & Production plc, an independent oil company, engages in the exploration, development, production, and sale of crude oil in Trinidad & Tobago. Total downloaded data - 54gb
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
