Ransomware victim disclosure
← All victimsEngie
Claimed by coinbasecartel · listed 1 month ago
Status timeline
- Listed
Apr 20, 2026
- Data leaked
At a glance
- Group
- coinbasecartel
- Status
- Data leaked
- Country
- FR
- Sector
- Energy
- Listed on leak site
- Apr 20, 2026
About the victim
AI dossier — public-source company profileENGIE is a French multinational energy company headquartered in the Paris La Défense area, operating across electricity generation, natural gas distribution, and renewable energy sectors including wind, solar, hydrogen, and hydroelectricity. It serves individuals, businesses, industries, and local authorities in over 70 countries worldwide. With revenues in the tens of billions of euros and over 100,000 employees, ENGIE is one of the world's largest energy groups and a major actor in the global energy transition.
- Industry
- Multinational Electric & Gas Utility / Energy Transition
- Address
- Tour T1, 1 Place Samuel de Champlain, 92400 Courbevoie, France
- Employees
- 100000+
- Founded
- 2008
Attack summary
Severity: high — ENGIE is a critical infrastructure operator (energy sector) active in over 70 countries; confirmed data publication by the threat actor against such a systemically important entity constitutes a high-severity incident even without explicit enumeration of data types, as any compromise of operational or business data at this scale poses significant risk.The coinbasecartel group claims to have attacked ENGIE and has published data ('data_published' status), though the leak post does not specify whether encryption, exfiltration, or both occurred, nor does it detail the volume or nature of the data disclosed.
Data the group says was taken
AI dossier — extracted from the leak post- Undisclosed published data files
Original description
AI-summarised, not from the leak postEngie is a French multinational energy company headquartered in Paris, France. It operates across the electricity generation, natural gas distribution, and renewable energy sectors. The company provides energy services to individuals, businesses, and local authorities worldwide, with activities spanning power production, infrastructure management, and energy efficiency solutions. Engie is active in over 70 countries globally.
The leak post
captured from the group's siteSystem Breach • Coinbasecartel We are looking for new partners/insiders. Send us a message to dicuss We are looking for new partners/insiders. Send us a message to dicuss CRITICAL ANNOUNCEMENTS × Contact Update We have changed our contact method. We now exclusively use qTox Messenger for all communications. SimpleX and Session have been discontinued. Our Tox ID: A7580331D4D16453CCE86D7ADFBCF0CEED0D0D1AEA8F4DBEEBCA9E3B46308F260DE9B41BD838 TO APTIM You may have noticed the sudden, heavy silence. The corporate VPNs are dead. We have been the silent architects of your network for the past three weeks. While your "elite" investigators from Mandiant sat in your logs, we sat directly beside them burning through over a hundred of your corporate identities like disposable tools. we have had your entire network and internal protocols. HOW LONG WILL YOU KEEP YOUR THOUSANDS OF FIELD WORKERS LOCKED OUT? We have successfully exfiltrated the most sensitive engineering data held by any firm in your sectors We hold the complete Navisworks 3D models, P&ID diagrams, and maintenance logic for your major energy plants. This includes the granular Honeywell DCS controller logic. We know…
Sources
Source
Indexed 1 month agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
