Ransomware victim disclosure
← All victimsAtlas Metal Industries Inc
Claimed by aurora · listed 21 days ago
Status timeline
- Listed
Apr 29, 2026
- Data leaked
At a glance
- Group
- aurora
- Status
- Data leaked
- Country
- CA
- Sector
- Manufacturing
- Listed on leak site
- Apr 29, 2026
About the victim
AI dossier — public-source company profileAtlas Metal Industries Inc. is a privately held manufacturer of commercial foodservice equipment headquartered in Miami, Florida. The company designs and fabricates stainless steel and aluminum serving line equipment—including hot, cold, refrigerated, and modular serving units—sold under product lines such as INFINITI, BL Series, and CA Series. It operates under the brand atlasfoodserv.com and serves institutional settings including K-12 schools and commercial food service environments.
- Industry
- Commercial Foodservice Equipment Manufacturing
- Address
- Miami, Florida, USA
Attack summary
Severity: critical — The exfiltration includes large-scale regulated PII (SSNs, DOBs, bank routing numbers, W-4 tax data for employees dating to 2018), plaintext and hashed credentials enabling further compromise, and full proprietary product-design and manufacturing IP — constituting confirmed exfiltration of both regulated personal financial/identity data and sensitive business data at significant scale.The Aurora ransomware group claims to have exfiltrated data from Atlas Metal Industries on or about April 8, 2026, with the attack identified April 22, 2026; the published dataset encompasses the complete Microsoft Dynamics GP environment including payroll databases with employee PII, SQL Server credentials, 74 GB of Autodesk Vault product-design history, CNC fabrication programs, and full SQL Server database backup chains.
Data the group says was taken
AI dossier — extracted from the leak post- Payroll records database (PYREC) — 15.8 GB
- Employee SSNs, DOBs, and home addresses
- Direct-deposit bank routing numbers
- Salary and W-4 tax data
- Payroll garnishments and check history (from 2018)
- 30+ SQL Server login accounts with password hashes
- Active Directory domain account credentials
- Autodesk Vault Professional backup — 74 GB (2019–2026 product design history)
- CNC fabrication programs (laser-cutter and Amada punch-press G-code)
- 8 SQL Server databases with full backup chains (ATLAS, PYREC, DYNAMICS, TEST, TWO, AMIT, master, msdb, DynamicsGPSecurity)
- TimeClock Plus SQL credentials in plaintext XML
- Infrastructure configuration files
What the group claims
[food, metal] Atlas Metal Industries Inc. — a privately held commercial-foodservice-equipment manufacturer headquartered in Miami, Florida. The dataset is a complete Microsoft Dynamics GP environment: production databases, payroll records, system credentials, Autodesk Vault product-design backups, CNC fabrication programs, and all supporting infrastructure configuration. The exfiltration occurred on or about April 8, 2026; the attack was identified April 22, 2026. The exposed material includes: 15.8 GB of payroll-records database (PYREC) — full Employee Master with SSNs, DOBs, addresses, direct-deposit bank routing numbers, salary, W-4 tax data, garnishments, and check history dating to at least 2018. 30+ SQL Server login accounts with password hashes in a sp_help_revlogin dump — named employees, system admins (DYNSA, sa), service accounts, and Active Directory domain accounts. 74 GB of Autodesk Vault Professional backup — complete product-design history from 2019 through 2026, covering every product line Atlas Metal manufactures. Hundreds of CNC fabrication programs — laser-cutter and Amada punch-press G-code for the full catalogue of sheet-metal components. A base64-encoded SQL credential for the TimeClock Plus timekeeping system, stored in plaintext XML. 8 SQL Server databases with full backup chains — ATLAS (primary), PYREC (payroll), DYNAMICS (system), TEST (18 GB dev clone), TWO, AMIT, plus system databases (master, msdb, DynamicsGPSecurity).
Sources
Source
Indexed 21 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
