Ransomware victim disclosure
← All victimsStolle Machinery
Claimed by Hiveleak · listed 3 years ago
Status timeline
- Listed
Dec 20, 2022
- Data leaked
At a glance
- Group
- Hiveleak
- Status
- Data leaked
- Country
- United States
- Sector
- Manufacturing
- Listed on leak site
- Dec 20, 2022
About the victim
AI dossier — public-source company profileStolle Machinery is described as the world's leading supplier of two-piece can and end-making machinery for the global canmaking industry. The company manufactures high-speed machines used in can plants worldwide to perform value-added functions in the canmaking process. It is headquartered in the United States and serves an international customer base.
- Industry
- Industrial Machinery & Equipment for Can Manufacturing
Attack summary
Severity: high — Exfiltration of all product-line blueprints constitutes significant theft of proprietary intellectual property from a world-leading industrial machinery manufacturer, posing serious competitive and national-security-adjacent risks; however, no regulated PII, medical, or government data is indicated, keeping it below critical.The Hiveleak group claims to have exfiltrated proprietary engineering data from Stolle Machinery, with blueprints for all product lines announced as forthcoming publications. The disclosed status indicates data has already been published.
Data the group says was taken
AI dossier — extracted from the leak post- Product line blueprints
- Engineering/design schematics
What the group claims
**** ALL BLUEPRINTS OF ALL PRODUCT LINES WILL BE AVAILABLE SOON **** Stolle is the world's leading supplier of two piece can and end-making machinery for the global canmaking industry. Our high speed machines can be found in can plants around the world performing the value-added functions of the canmaking process.
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
