Ransomware victim disclosure
← All victimsAccretech America Inc.
Claimed by AiLock · listed 10 days ago
Status timeline
- Listed
May 11, 2026
- Data leaked
At a glance
- Group
- AiLock
- Status
- Data leaked
- Country
- US
- Sector
- Manufacturing
- Listed on leak site
- May 11, 2026
About the victim
AI dossier — public-source company profileAccretech America Inc. is the U.S. division of Tokyo Seimitsu Co., Ltd., a Japanese corporation specialising in semiconductor equipment and precision instrumentation. Its U.S.-facing brand Accretech SBS Inc. develops automatic balancing and process control solutions for industrial grinding machines, as well as rugged sensor measurement tools for geometric dimensioning and tolerancing (GD&T) applications. The company serves industrial manufacturing customers and operates an international product line with support resources in English, German, and Japanese.
- Industry
- Semiconductor Equipment & Precision Instrumentation / Industrial Balancing Systems
Attack summary
Severity: high — Data has been published by the threat actor (data_published status), confirming exfiltration rather than a mere listing. The victim is a U.S. subsidiary of a Japanese semiconductor and precision instrumentation conglomerate, making exfiltrated business and potentially technical/IP data significant. No specific regulated PII at scale or critical infrastructure impact is confirmed, keeping this at high rather than critical.The AiLock ransomware group claims an attack on Accretech America Inc. and has published data (disclosed status: data_published), indicating exfiltration of company data; no ransom amount or specific data volume was stated in the post.
What the group claims
Accretech America Inc. is the U.S. division of Tokyo Seimitsu Co., Ltd. of Japan, a Japanese corporation specialising in semiconductor equipment and precision instrumentation.
Sources
- Victim siteaccretechsbs.com
Source
Indexed 10 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
