Ransomware victim disclosure
← All victimsTeco HVAC, LLC
listed as Teco · Claimed by sinobi · listed 2 months ago
Status timeline
- Listed
Mar 17, 2026
- Data leaked
At a glance
- Group
- sinobi
- Status
- Data leaked
- Country
- United States
- Sector
- Energy
- Listed on leak site
- Mar 17, 2026
About the victim
AI dossier — public-source company profileTeco HVAC, LLC is a full-service HVAC and plumbing company serving the Baltimore-Washington and Northern Virginia areas. The company specializes in heating, cooling, and plumbing solutions and has operated in the region since 2002. It emphasizes prompt, reliable service with a focus on integrity and customer satisfaction.
- Industry
- HVAC & Plumbing Services
- Founded
- 2002
Attack summary
Severity: medium — Data has been published (disclosed status: data_published) indicating confirmed exfiltration, but the victim is a small regional HVAC/plumbing contractor with no indication of large-scale regulated PII, medical, financial, or critical infrastructure data; scale and sensitivity appear moderate.The ransomware group Sinobi claims to have attacked Teco HVAC, LLC and has disclosed data publicly. The leak post indicates data has been published, though no specific data size or ransom demand was stated.
Data the group says was taken
AI dossier — extracted from the leak post- Customer records
- Business operational data
- Service/project files
What the group claims
Teco HVAC, LLC is a full-service HVAC and plumbing company serving the Baltimore-Washington and Northern Virginia areas. They are dedicated to providing high-quality service and customer satisfaction, specializing in heating, cooling, and plumbing solutions. The company emphasizes quick and reliable service, ensuring that clients receive prompt assistance for their HVAC and plumbing needs. With a commitment to integrity, quality, and trust, Teco HVAC has been a trusted provider in the region since 2002.
Sources
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
