Ransomware victim disclosure
← All victimsJD Sprinter Holdings 2010 SL
Claimed by Metaencryptor · listed 2 years ago
Status timeline
- Listed
Nov 28, 2023
- Data leaked
At a glance
- Group
- Metaencryptor
- Status
- Data leaked
- Country
- Spain
- Sector
- Retail & Consumer
- Listed on leak site
- Nov 28, 2023
- Records
- 7500 employees
About the victim
AI dossier — public-source company profileJD Sprinter Holdings 2010 SL is a Spanish sports and outdoor retail company operating under the Sprinter Sports brand. The company retails sportswear, outdoor clothing, and related equipment, with over 7,500 employees and a reported EBITDA of 109 million EUR. It is a subsidiary within the JD Sports Fashion group operating primarily in Spain.
- Industry
- Sportswear & Outdoor Clothing Retail
- Employees
- 7500+
- Founded
- 2010
Attack summary
Severity: high — Data has been confirmed as published by the group against a large retail employer with 7,500+ employees, indicating significant exfiltration of business data at scale. The company size and EBITDA figures suggest substantial corporate data exposure.The Metaencryptor group claims to have attacked JD Sprinter Holdings 2010 SL and has published data, though specific details on encryption or exfiltration methods are not stated in the post. The disclosed status indicates data has been published.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate financial data
- Employee records
- Business operations data
What the group claims
JD Sprinter Holdings 2010 SL retails sportswear, outdoor clothing, and related equipment. over 7500 employees 109 M EUR EBITDA
Sources
- Victim sitesprintersports.com
- Leak posthttp://metacrptmytukkj7ajwjovdpjqzd7esg5v3sg344uzhigagpezcqlpyd.onion/0AFC:b52ca967254a41b607e0082d0fac7970/0AFC:e41164a7da1f056fc530aa642ad54e5fc534886de6c291326a86e7b6c0e6feb5/0AFC:890dc9542493de2eed260f729a0ee1ba9af528c4e6f9d381ace124f4dfd8abb95e97cbeb15f349d7e92b3ad15332c57d
Source
Indexed 2 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
