Ransomware victim disclosure
← All victimsStockmann Natursteine & Fliesen
Claimed by Nokoyawa · listed 3 years ago
Status timeline
- Listed
May 23, 2023
- Data leaked
At a glance
- Group
- Nokoyawa
- Status
- Data leaked
- Country
- Germany
- Sector
- Construction
- Listed on leak site
- May 23, 2023
About the victim
AI dossier — public-source company profileStockmann Natursteine & Fliesen is a small family-run tiling and natural stone installation contractor based in Laupheim, Germany. With approximately 30 years of professional experience, the company offers services including tile laying, natural stone work, staircase and terrace installation, bathroom renovation, and barrier-free living solutions. It operates locally in Laupheim and the surrounding region.
- Industry
- Natural Stone & Tile Installation
- Address
- Laupheim, Baden-Württemberg, Germany
- Employees
- 1-10
Attack summary
Severity: medium — Data has been published by the group, indicating confirmed exfiltration, but the victim is a very small local trades contractor with limited likelihood of regulated data at scale; no data volume, file count, or sensitive data categories (medical, financial, government) are evidenced.Nokoyawa claims to have attacked Stockmann Natursteine & Fliesen and has published data (disclosed status: data_published), though the leak post provides no explicit detail on whether encryption, exfiltration, or both occurred, and no specific data categories or file counts are advertised.
Data the group says was taken
AI dossier — extracted from the leak post- Business correspondence
- Customer records
- Internal company files
What the group claims
Welcome to Stockmann Natursteine & Fliesen - your natural stone and tiler in Laupheim and the surrounding area! With 30 years of professional experience, we bring all our expertise and passion to each of our assignments. We don't want to say many words about our capabilities or our...
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
