Ransomware victim disclosure
← All victimsbpost
Claimed by tridentlocker · listed 6 months ago
Status timeline
- Listed
Dec 1, 2025
- Data leaked
At a glance
- Group
- tridentlocker
- Status
- Data leaked
- Country
- BE
- Sector
- Telecommunication
- Listed on leak site
- Dec 1, 2025
About the victim
AI dossier — public-source company profilebpost is the national postal operator of Belgium, providing mail, parcel, and logistics services across Belgium and internationally. It is a publicly listed company headquartered in Brussels and one of Belgium's largest employers. bpost also operates e-commerce logistics through subsidiaries in Europe and North America.
- Industry
- Postal & Parcel Delivery Services
- Address
- Centre Monnaie / Muntcentrum, 1000 Brussels, Belgium
- Employees
- 25000
- Founded
- 1830
Attack summary
Severity: high — bpost is a national postal operator handling significant volumes of personal and business data; confirmed exfiltration and data publication of 30+ GB from a major public-sector-adjacent company constitutes high severity, with likely PII exposure at scale.TridentLocker claims to have exfiltrated data from bpost, with a published leak of approximately 30.46 GB of data disclosed on 1 December 2025. The disclosed status indicates the data has been published rather than merely threatened.
Data the group says was taken
AI dossier — extracted from the leak post- Exfiltrated corporate data (30.46 GB)
Original description
AI-summarised, not from the leak postbpost is a Belgian company that handles the sorting, collection, transportation and delivery of postal services both locally and internationally. Apart from this, they also manage electronic communications, financial transactions, and other related services. bpost operates in the mail sector as well as in the parcel and e-commerce logistics in Europe, North-America and Asia.
The leak post
captured from the group's siteTridentLocker TridentLocker asiawba Leak date 9.11.2025 Total leak size: 2.7 GB typecaseinc Leak date 15.11.2025 Total leak size: 184.55 GB Calmec Leak date 15.11.2025 Total leak size: 73.91 GB EnQuest Leak date 16.11.2025 Total leak size: 177.44 GB LMG Holdings Leak date 18.11.2025 Total leak size: 27.28 GB iqs Leak date 18.11.2025 Total leak size: 312.77 GB Advantage 360 Leak date 20.11.2025 Total leak size: 73.54 GB GuestTek Leak date 20.11.2025 Total leak size: 126.98 GB bpost Leak date 01.12.2025 Total leak size: 30.46 GB noment Leak date 02.12.2025 Total leak size: 30.9 GB allenprinting Leak date 19.12.2025 Total leak size: 88.28 GB Sedgwick Government Solutions Leak date 30.12.2025 Total leak size: 3.39 GB Eco Green Group Leak date 12.01.2026 Total leak size: 122.5 GB TMPartner Leak date 06.02.2026 Total leak size: 2.8 GB Jameson Pepple Cantu PLLC Leak date 05.03.2026 Total leak size: 178.05 GB RT Software Leak date 26.04.2026 Total leak size: 402.14 GB × Edit Article Target: Date: Size: File Count: Archives: Save Changes
Sources
Source
Indexed 6 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
