Ransomware victim disclosure
← All victimsNTN Bearing Corporation of America
Claimed by payoutsking · listed 8 days ago
Status timeline
- Listed
May 13, 2026
- Data leaked
At a glance
- Group
- payoutsking
- Status
- Data leaked
- Country
- US
- Sector
- Manufacturing
- Listed on leak site
- May 13, 2026
About the victim
AI dossier — public-source company profileNTN Bearing Corporation of America is the US subsidiary of NTN Corporation, one of the world's largest manufacturers of bearings, constant velocity joints, and precision industrial components. The company serves automotive, aerospace, industrial, and heavy-duty markets across North America, operating as part of a global network of over 75 plants. It supplies OEM and aftermarket customers across a wide range of industries including defense, agriculture, rail, and wind energy.
- Industry
- Precision Bearings & Power Transmission Components Manufacturing
- Address
- 1600 E. Bishop Court, Mount Prospect, IL 60056, USA
- Employees
- 1001-5000
- Founded
- 1963
Attack summary
Severity: critical — The disclosure includes confirmed exfiltration of Controlled Unclassified Information (CUI) tied to a US Army defense program (JLTV), PII for over 7,500 employees, and sensitive financial and contractual data. The defense-related technical drawings carry statutory liability under DoD Directive 5230.25, elevating this to a critical national-security-adjacent incident involving both regulated personal data and export-controlled/defense information.The group claims to have exfiltrated sensitive data including engineering drawings and 3D models related to the US Army Joint Light Tactical Vehicle (JLTV) program marked under DoD Directive 5230.25 (Controlled Unclassified Information), personal data on 7,500+ employees, financial statements, quality testing reports, and contracts, with data published and file paths provided as proof.
Data the group says was taken
AI dossier — extracted from the leak post- JLTV program engineering drawings and 3D models (CUI, ~100 PDF files)
- Employee PII (7,500+ individuals)
- Financial statements
- Quality testing reports
- Contracts
- JSOX internal control documentation
- FY2026 operating business plan / cost sharing data
- Pension non-key controls documentation
- Oshkosh subcontractor drawings (FOC RFQ)
The group's post references roughly 100 proof files.
Original description
AI-summarised, not from the leak postNTN Bearing Corporation of America is a US-based subsidiary of Japan's NTN Corporation, operating in the industrial manufacturing sector. The company produces and distributes precision bearings, driveshafts, and related mechanical components used in automotive, aerospace, and industrial machinery applications. Headquartered in Mount Prospect, Illinois, it serves customers across North America with engineering support and distribution services.
The leak post
captured from the group's site### NTN Bearing Corporation of America NTN Bearing is a producer of ball and roller bearings, with plants around the globe and a strong, domestic manufacturing network. Drawings and 3D models for the Joint Light Tactical Vehicle (JLTV) Family of Vehicles (FoV) Program US ARMY Approximately 100 PDF files marked within Directive 5230.25 Liability: Up to $1.2 million for each (!) violation (each file or each person accessed may be considered a separate incident). Up to $1 million for each violation for the corporation itself. Personal data for 7,500+ employees - Up to $2,500 for data on one person Points of interest for competitors: Financial statements, Quality testing reports, Contracts \RAMPSVFS01\D\ntnusa\Executive\NTN USA\Internal Control America's\FY 25\JSOX\NTN USA\Process Test\PBC\Pension\Non-Key Controls\ \RAMPSVFS01\D\ntnusa\Executive\NTN USA\300 事業計画(Plan)\FY2026 OBP\3 from Subs\Cost Sharing\ \RAMPSVFS01\D\common\CUI\Oshkosh\Oshkosh Drawings\FOC RFQ 95527\FOC RFQ 95527\
Sources
Source
Indexed 8 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
