Ransomware victim disclosure
← All victimsLonestar Truck Group & Tag Truck Center
Claimed by interlock · listed 16 days ago
Status timeline
- Listed
May 4, 2026
- Data leaked
At a glance
- Group
- interlock
- Status
- Data leaked
- Country
- US
- Sector
- Transportation/Logistics
- Listed on leak site
- May 4, 2026
About the victim
AI dossier — public-source company profileLonestar Truck Group and TAG Truck Center (operating as TNTX, LLC) is a multi-state commercial truck and trailer dealership group headquartered in Grapevine, Texas. They sell new and used trucks (Freightliner, Western Star) and trailers across roughly 25+ locations spanning Texas, Arkansas, Louisiana, New Mexico, Missouri, Tennessee, Mississippi, and Kentucky. They also provide parts, service, financing, leasing, and driver training.
- Industry
- Commercial Truck & Trailer Dealership
- Address
- 2051 Hughes Rd, Grapevine, TX 76051
Attack summary
Severity: high — The group claims confirmed exfiltration and publication of employee PII, customer records at scale, and financial/confidential business documents across a large multi-state dealership operation; data is stated to be already published online.The Interlock ransomware group claims to have exfiltrated data from Lonestar Truck Group, including personal data of employees, contact information for business partners, customer records, and confidential financial documents, and has published this data online.
Data the group says was taken
AI dossier — extracted from the leak post- Employee personal data
- Business partner contact information
- Customer records
- Confidential documents
- Financial documents
What the group claims
Lonestar Truck Group consists of multiple dealerships that sell new and used trucks and trailers, as well as providing service and parts. They work with a vast number of customers and businesses, yet they have failed to prioritize security. As a result, personal data of employees, contact information for the companies they work with, and a significant number of customer records have been leaked online. We are also presenting their confidential and financial documents for your review.
Sources
Source
Indexed 16 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
