Ransomware victim disclosure
← All victimsSterling Industries
Claimed by AiLock · listed 3 months ago
Status timeline
- Listed
Mar 3, 2026
- Data leaked
At a glance
- Group
- AiLock
- Status
- Data leaked
- Country
- United States
- Sector
- Not Found
- Listed on leak site
- Mar 3, 2026
About the victim
AI dossier — public-source company profileSterling Industries is a North American-based contract manufacturer and assembler of medical devices and sub-components, with over 40 years of experience. The company offers end-to-end services including product design, DFM, cleanroom assembly, testing, packaging, sterilization, supply chain optimization, and regulatory compliance management. Its client base ranges from Fortune 100 companies to late-stage startups.
- Industry
- Medical Device Contract Manufacturing
Attack summary
Severity: critical — Sterling Industries is a medical device contract manufacturer handling regulated design, manufacturing, and compliance documentation for medical devices. A confirmed data publication by the threat actor exposes sensitive regulated data (medical device design and process records, client PII, regulatory filings) tied to healthcare/medical sector, qualifying as critical under the severity guidance.AiLock claims to have attacked Sterling Industries and the disclosure status is listed as data_published, indicating data has been exfiltrated and published. No specific ransom amount or data volume was stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Medical device design documentation
- Process documentation
- Regulatory compliance records
- Supply chain data
- Client manufacturing records
- Quality assurance records
- Lot-tracking and labeling data
What the group claims
Sterling Industries is a North American-based contract manufacturer and assembler of medical devices and sub-components.
Sources
- Victim sitesterlingindustries.com
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
