[WORLDLEAKS] – Ransomware Victim: Sneg Proprete
![[WORLDLEAKS] - Ransomware Victim: Sneg Proprete 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: WORLDLEAKS
VICTIM NAME: Sneg Proprete
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the WORLDLEAKS Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On August 26, 2025, a leak post attributed to the ransomware group worldleaks identifies Sneg Proprete as a victim of a ransomware incident. Sneg Proprete is described as a French provider of professional cleaning and maintenance services, operating primarily in the Île-de-France region and serving corporate offices, commercial properties, medical and social facilities, and schools. The post notes that a claim URL is present on the page, suggesting the attackers provide additional information or negotiation terms via an external link, which has been defanged for safety. The page contains no visible screenshots or image assets, and there are no downloadable files or attachments listed in the available data.
Regarding impact and scope, the data does not specify whether systems were encrypted or whether data was exfiltrated, nor is there a listed ransom amount. No explicit compromise date is provided; the post date is used as the temporal anchor: August 26, 2025. The record preserves the victim name, Sneg Proprete, and notes the company operates in the Business Services sector within France. The absence of images (zero) and any attached files limits corroboration of the incident from the excerpt, though the presence of a defanged claim URL indicates the attackers intended to offer additional information or negotiation terms beyond the public posting.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.