15-12-25, 11:29 AM
(This post was last modified: 16-12-25, 02:22 PM by BreachLaboratory.)
armetal.com | 38.4 GB Internal Leak | Saudi Industrial Corp Breach | @BreachLabs
Target: 🇸🇦 Saudi ArabiaÂ
Type: Internal Corporate Documents + EmailsÂ
Dump Size: 38.43 GB (.rar archive)Â
Records: Over 450K unique internal filesÂ
Leak Date: March 2025Â
Origin: armetal.com (Armetal Metal Industries)
Contents:Â
• Internal Company Emails (.pst, .msg, .eml)Â
• Contracts, POs, Commercial InvoicesÂ
• HR Spreadsheets: Salaries, ID scans, Employee dataÂ
• Manufacturing Blueprints & Project Files (CAD, DWG)Â
• Procurement Documents, Vendor ListsÂ
• Customer Payment & Bank Transfer ReceiptsÂ
• Saudi citizen ID photos + visa/work permit attachmentsÂ
• Full ERP exports from 2023–2025Â
• Server-side logs, network maps, credentials
Notes:Â
Full corporate compromise from one of Saudi Arabia’s largest metal production firms. Breach carried out by ransomware group **Babuk2**, followed by full data exposure on underground channels. Files contain sensitive employee and financial records, contract negotiations with state entities, and private documents from executive inboxes.Â
Vouches: https://t.me/+MKZypfnQRuozOWQ8
Contact: https://t.me/BreachLabsDf
Need datasets from 2015 to 2025? Contact us — massive archive available.
Download Full File: https://t.me/+Pw7z2f8Ha2RlZmM8
If you're looking for datasets from 2015–2025, message us directly – we hold one of the largest underground collections available.
Target: 🇸🇦 Saudi ArabiaÂ
Type: Internal Corporate Documents + EmailsÂ
Dump Size: 38.43 GB (.rar archive)Â
Records: Over 450K unique internal filesÂ
Leak Date: March 2025Â
Origin: armetal.com (Armetal Metal Industries)
Contents:Â
• Internal Company Emails (.pst, .msg, .eml)Â
• Contracts, POs, Commercial InvoicesÂ
• HR Spreadsheets: Salaries, ID scans, Employee dataÂ
• Manufacturing Blueprints & Project Files (CAD, DWG)Â
• Procurement Documents, Vendor ListsÂ
• Customer Payment & Bank Transfer ReceiptsÂ
• Saudi citizen ID photos + visa/work permit attachmentsÂ
• Full ERP exports from 2023–2025Â
• Server-side logs, network maps, credentials
Notes:Â
Full corporate compromise from one of Saudi Arabia’s largest metal production firms. Breach carried out by ransomware group **Babuk2**, followed by full data exposure on underground channels. Files contain sensitive employee and financial records, contract negotiations with state entities, and private documents from executive inboxes.Â
Quote:Filename: Payroll_Jan2025.xlsxÂ
Contains: 132 rowsÂ
• Name, Position, National ID, IBAN, Salary, BonusÂ
—Â
Filename: Contracts_KSA_Gov_Projects_Confidential.docxÂ
Pages: 18Â
• Govt Project Scope + Budget + Deadline + Armetal SignatureÂ
—Â
Filename: fullmailbox_ceo@armetal.com.pstÂ
Size: 2.3 GBÂ
• Outlook PST archive, 2019–2024Â
• Includes PDFs, spreadsheets, email attachmentsÂ
—Â
Filename: visa_scans_expats_2023.zipÂ
Files: 312 imagesÂ
• Saudi Visa + Passport + ID scans (expat workers)Â
—Â
Filename: engineering_drawings_line2.dwgÂ
Blueprint: Internal pipe production machine v2Â
...
Vouches: https://t.me/+MKZypfnQRuozOWQ8
Contact: https://t.me/BreachLabsDf
Need datasets from 2015 to 2025? Contact us — massive archive available.
Download Full File: https://t.me/+Pw7z2f8Ha2RlZmM8
If you're looking for datasets from 2015–2025, message us directly – we hold one of the largest underground collections available.
The only official voucher channel:  https://t.me/BreachLabolatory - Banned https://t.me/BreachLabs -Banned
NEW VOUCHES CHANNEL JOIN:Â https://t.me/+MKZypfnQRuozOWQ8
NEW REPOSITORY DL CHANNEL Samples & Full Files:Â https://t.me/+Pw7z2f8Ha2RlZmM8
If you're writing to me, make sure you're writing to: https://t.me/BreachLabsdf
NEW VOUCHES CHANNEL JOIN:Â https://t.me/+MKZypfnQRuozOWQ8
NEW REPOSITORY DL CHANNEL Samples & Full Files:Â https://t.me/+Pw7z2f8Ha2RlZmM8
If you're writing to me, make sure you're writing to: https://t.me/BreachLabsdf

