Ransomware victim disclosure
← All victimsTTT Company
Claimed by Stormous · listed 9 days ago
Status timeline
- Listed
May 12, 2026
Current state: Listed for ransom
At a glance
- Group
- Stormous
- Status
- Listed for ransom
- Listed on leak site
- May 12, 2026
- Data size
- 5TB
- Ransom demanded
- $900k
About the victim
AI dossier — public-source company profileTTT Company is a firm operating in the interior design and architecture sector, undertaking projects for high-profile clients including Toyota showrooms, gyms, luxury resorts, and government facilities. The company produces blueprints, CAD designs, and architectural plans. No public website or registered address was available to confirm jurisdiction or scale.
- Industry
- Interior Design & Architecture
Attack summary
Severity: critical — The group claims exfiltration of regulated PII at scale (passports, IDs, private medical records for all employees), combined with sensitive government project data, financial audits, and security schematics. The volume (5 TB) and breadth of data types — including medical records and government-related materials — meets the critical threshold.Stormous claims to have fully exfiltrated 5 TB of data from TTT Company's internal infrastructure, including CAD/blueprint files, employee personal documents (IDs, passports, medical records), confidential contracts, tax reports, financial audits, and security schematics for client buildings. A ransom of $900,000 has been demanded to prevent further disclosure.
Data the group says was taken
AI dossier — extracted from the leak post- Complete blueprints and CAD designs
- Employee IDs and passports
- Employee private medical records
- Personal employee drive contents
- Confidential client contracts
- Tax reports (BCTC)
- Internal financial audits
- Security schematics for client buildings
- Government project documentation
What the group claims
While TTT Company was preoccupied with designing luxurious interiors and architectural masterpieces, they completely overlooked the design of a secure network. We have successfully exfiltrated all of the company's data and now possess 5 TB of the most sensitive information, including complete blueprints and CAD designs for prestigious clients (Toyota showrooms, gyms, luxury resorts, and government projects).
The leak post
captured from the group's siteams-group.co.uk FULL DATA DUMP 33GB ams-group.co.uk FULL DATA DUMP 33GB The extracted data comprises administrative and financial records, payroll sheets, and client and partner directories, alongside technical and engineering specifications, employee records, and business plans. It also includes architectural designs, official contracts, detailed engineering reports, and construction site maps, as well as risk assessments, internal correspondence, and tax and legal information. We releasing the databases of CGCSA.CO.ZA (Consumer Goods Council of South Africa) for free. This comes after the company failed to reach a resolution and publicly denied the breach.The total size is 20 GB and includes.Full Reports CustomerData (thousands of clients) Scripts & Statements Invoices & CEO Reports TCS CGCSA & CGCSA ACC BACKUP SAGE200EVOSQL CGCSA FULL The data has been uploaded to Mega https://mega.nz/folder/siwUDQbL#-c-tWl8fW8zy1tcmEzoUhw $900k to Solve the Problem 5TB — While TTT Company was preoccupied with designing luxurious interiors and architectural masterpieces, they completely overlooked the design of a secure network. We have spent enough time within their internal infrastructure to c…
Data the group says was taken
- blueprints
- CAD designs
- employee personal drives
- IDs
- passports
- medical records
- contracts
- tax reports
- financial audits
- security schematics
Sources
Source
Indexed 9 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
