[STORMOUS] – Ransomware Victim: www[.]francetravail[.]fr

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the STORMOUS Onion Dark Web Tor Blog page.

Ransomware group:
STORMOUS
Victim name:
WWW[.]FRANCETRAVAIL[.]FR

AI Generated Summary of the Ransomware Leak Page

On 2025-10-27 20:46:17.782934, a leak post published by the Stormous ransomware group identifies www.francetravail.fr as a victim. The page presents itself as a public data‑leak notice, indicating that sensitive information was exfiltrated from the victim’s network in a data‑leak event rather than a pure encryption incident. A claim URL is listed on the page, but the URL is defanged for this summary. No separate compromise date is provided; the timestamp is treated as the post date. The page shows no downloadable materials or images, and no ransom amount or demand is stated within the available data.

The page enumerates a broad set of highly sensitive personal data described as exposed. The listed categories include plaintext authentication credentials (usernames and passwords) and personal identifiers such as full names, dates of birth, and gender, along with addresses, phone numbers, and emails. Additional data types reportedly include employment history and professional skills, government identifiers and banking details (CNI and Relevé d’Identité Bancaire, i.e., RIB), and employment documentation such as contract types (CDD, CDI, and temporary assignments). Further items referenced include tax documents (Avis d’imposition), social security attestations, training certificates, and work authorization documents, among others. There are no images or screenshots on the page, nor visible downloadable files in the provided post, and no explicit ransom figure is disclosed in the available information.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features