Ransomware victim disclosure
← All victimsSEMAG
listed as semag.fr · Claimed by Braincipher · listed 7 months ago
Status timeline
- Listed
Oct 29, 2025
- Data leaked
At a glance
- Group
- Braincipher
- Status
- Data leaked
- Country
- France
- Sector
- Technology
- Listed on leak site
- Oct 29, 2025
About the victim
AI dossier — public-source company profileSEMAG (Société d'Économie Mixte Aménageur de territoire) is a French mixed-economy company operating as a territorial developer, likely involved in urban planning, land development, and social/residential housing management in France. The public site indicates tenants pay rent through the company's online portal and that the company issues public procurement calls via a buyer profile. Its activities suggest a semi-public entity with local government ties.
- Industry
- Territorial Development & Social Housing
Attack summary
Severity: critical — Over 1 TB of data has been published via multiple onion download links. As a territorial developer and housing manager handling tenant rental payments and personal data, the likely exposure of regulated PII (tenant identities, financial/payment records) at scale meets the critical threshold. The data is confirmed published, not merely threatened.Braincipher claims to have exfiltrated more than 1 TB of data from SEMAG, with multiple onion download links published, indicating the stolen data has already been made available for download. No encryption claim is explicitly stated, but the data is described as published.
Data the group says was taken
AI dossier — extracted from the leak post- Exfiltrated company data (1+ TB)
- Potentially tenant personal and financial records
- Potentially public procurement documents
- Potentially internal business documents
Original description
AI-summarised, not from the leak postN/A
The leak post
captured from the group's siteWe have more 1TB of data. If you think you are here by mistake, please contact us at [email protected] ⏳ 11d 22h 39m 6s remaining Download: 3fg2gfwrdks46drwvejpgpak5klrflclsjjo35dxtqfk3poeez6oezad.onion If you think you are here by mistake, please contact us at [email protected] Download: emdnfl2fv32jhssxcbxlo6dzg2at4d7qbw2md6inz63qzdfgyln5cwyd.onion If you think you are here by mistake, please contact us at [email protected] Download: a4vbe7yp4kluped6khuhpr5nmzshiimx2jt5j22ozriiq6ngsm3fcpyd.onion If you think you are here by mistake, please contact us at [email protected] Download: x3nb7qcygpem2j5xzstyzdtgzofzkwkx4eko3ug4r73i6uhcgvyffjyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 3frnhzcnlkjnw5q3tm6elzizinm2k3bmrtf2xwqjzpcxzeqwn2tv6wyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 6ft2dfh26wm3w44orpjcgviutvfp25ez2iyh5ego5egvfmifrws7vvqd.onion If you think you are here by mistake, please contact us at [email protected] Download: zijgmuqjzb6dc7pofxhtaiz36qqyg35lhutybmzaz6whzgei2casjgid.onion If you think…
Sources
Source
Indexed 7 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
