Yesterday, 11:29 AM
armetal.com | 38.4 GB Internal Leak | Saudi Industrial Corp Breach | @BreachLabs
Target: 🇸🇦 Saudi ArabiaÂ
Type: Internal Corporate Documents + EmailsÂ
Dump Size: 38.43 GB (.rar archive)Â
Records: Over 450K unique internal filesÂ
Leak Date: March 2025Â
Origin: armetal.com (Armetal Metal Industries)
Contents:Â
• Internal Company Emails (.pst, .msg, .eml)Â
• Contracts, POs, Commercial InvoicesÂ
• HR Spreadsheets: Salaries, ID scans, Employee dataÂ
• Manufacturing Blueprints & Project Files (CAD, DWG)Â
• Procurement Documents, Vendor ListsÂ
• Customer Payment & Bank Transfer ReceiptsÂ
• Saudi citizen ID photos + visa/work permit attachmentsÂ
• Full ERP exports from 2023–2025Â
• Server-side logs, network maps, credentials
Notes:Â
Full corporate compromise from one of Saudi Arabia’s largest metal production firms. Breach carried out by ransomware group **Babuk2**, followed by full data exposure on underground channels. Files contain sensitive employee and financial records, contract negotiations with state entities, and private documents from executive inboxes.Â
Download Full File: https://t.me/+wFKZeQgCDmQyYTg8Â
Raw .rar archive with all 38.4 GB corporate documents from Armetal breach.
Vouches: https://t.me/BreachLaboratoryÂ
Contact: https://t.me/BreachLabsÂ
If you're looking for datasets from 2015–2025, message us directly – we hold one of the largest underground collections available.
Target: 🇸🇦 Saudi ArabiaÂ
Type: Internal Corporate Documents + EmailsÂ
Dump Size: 38.43 GB (.rar archive)Â
Records: Over 450K unique internal filesÂ
Leak Date: March 2025Â
Origin: armetal.com (Armetal Metal Industries)
Contents:Â
• Internal Company Emails (.pst, .msg, .eml)Â
• Contracts, POs, Commercial InvoicesÂ
• HR Spreadsheets: Salaries, ID scans, Employee dataÂ
• Manufacturing Blueprints & Project Files (CAD, DWG)Â
• Procurement Documents, Vendor ListsÂ
• Customer Payment & Bank Transfer ReceiptsÂ
• Saudi citizen ID photos + visa/work permit attachmentsÂ
• Full ERP exports from 2023–2025Â
• Server-side logs, network maps, credentials
Notes:Â
Full corporate compromise from one of Saudi Arabia’s largest metal production firms. Breach carried out by ransomware group **Babuk2**, followed by full data exposure on underground channels. Files contain sensitive employee and financial records, contract negotiations with state entities, and private documents from executive inboxes.Â
Quote:Filename: Payroll_Jan2025.xlsxÂ
Contains: 132 rowsÂ
• Name, Position, National ID, IBAN, Salary, BonusÂ
—Â
Filename: Contracts_KSA_Gov_Projects_Confidential.docxÂ
Pages: 18Â
• Govt Project Scope + Budget + Deadline + Armetal SignatureÂ
—Â
Filename: fullmailbox_ceo@armetal.com.pstÂ
Size: 2.3 GBÂ
• Outlook PST archive, 2019–2024Â
• Includes PDFs, spreadsheets, email attachmentsÂ
—Â
Filename: visa_scans_expats_2023.zipÂ
Files: 312 imagesÂ
• Saudi Visa + Passport + ID scans (expat workers)Â
—Â
Filename: engineering_drawings_line2.dwgÂ
Blueprint: Internal pipe production machine v2Â
...
Download Full File: https://t.me/+wFKZeQgCDmQyYTg8Â
Raw .rar archive with all 38.4 GB corporate documents from Armetal breach.
Vouches: https://t.me/BreachLaboratoryÂ
Contact: https://t.me/BreachLabsÂ
If you're looking for datasets from 2015–2025, message us directly – we hold one of the largest underground collections available.
The only official voucher channel: https://t.me/BreachLaboratory
If you're writing to me, make sure you're writing to: https://t.me/BreachLabs
If you're writing to me, make sure you're writing to: https://t.me/BreachLabs
