Ransomware victim disclosure
← All victimsAshley Furniture HomeStore
listed as Ashley HomeStore · Claimed by Mallox · listed 3 years ago
Status timeline
- Listed
Jul 1, 2023
- Data leaked
At a glance
- Group
- Mallox
- Status
- Data leaked
- Country
- United States
- Sector
- Retail & Consumer
- Listed on leak site
- Jul 1, 2023
About the victim
AI dossier — public-source company profileAshley Furniture HomeStore is one of the largest furniture manufacturers and retailers in the world, headquartered in Arcadia, Wisconsin. The company designs, manufactures, and sells home furnishings including living room, bedroom, and dining room furniture through thousands of retail locations across the United States and internationally. Ashley operates both company-owned and independently licensed store locations under the HomeStore brand.
- Industry
- Furniture Retail & Manufacturing
- Address
- 1 Ashley Way, Arcadia, WI 54612, United States
- Employees
- 10000+
- Founded
- 1945
Attack summary
Severity: high — Data has been publicly published (disclosed status: data_published) via an external file-sharing link, indicating confirmed exfiltration and full public release of company data. The scale of the company (major national retailer with thousands of locations) amplifies potential impact, though the specific contents of the archive are unverified.The Mallox ransomware group claims to have exfiltrated data from Ashley HomeStore and has published an archive (via AnonFiles) protected with a stated password, indicating data has been released publicly rather than held for ransom negotiation.
Data the group says was taken
AI dossier — extracted from the leak post- Exfiltrated company data archive
- Password-protected compressed file
The group's post references roughly 1 proof file.
What the group claims
INFO: https://www.zoominfo.com/c/ashley-homestore-ltd/7786767 DATA: https://anonfiles.com/9447C8z8z7/Ashley_7z PASSWORD: 597+9Tk?2gtW&&_6SW5#7<);D&81Q5)c
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
