Ransomware victim disclosure
← All victimsStonehenge Co Ltd
listed as Stonehenge · Claimed by lynx · listed 1 month ago
Status timeline
- Listed
Apr 14, 2026
- Data leaked
At a glance
- Group
- lynx
- Status
- Data leaked
- Country
- United Kingdom
- Sector
- Not Found
- Listed on leak site
- Apr 14, 2026
About the victim
AI dossier — public-source company profileStonehenge Co Ltd is a construction company operating in both the commercial and residential sectors, headquartered in Phra Nakhon Si Ayutthaya, Thailand. The company employs between 250 and 499 people and generates estimated annual revenue of between 10 million and 25 million USD. Despite the victim record listing the country as the United Kingdom, the leak post places the company in Thailand.
- Industry
- Commercial & Residential Construction
- Address
- Phra Nakhon Si Ayutthaya, Phra Nakhon Si Ayutthaya, Thailand
- Employees
- 250-499
Attack summary
Severity: high — The disclosed status is 'data_published', confirming that data has been exfiltrated and released by the threat actor. The company employs up to 499 people, making the scale of potential business data exposure significant, though no specific regulated or medical/financial data categories were enumerated.The Lynx ransomware group claims to have attacked Stonehenge Co Ltd and has published data (disclosed status: data_published), indicating exfiltration of company data. No specific ransom amount or data volume was stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Company data (unspecified)
What the group claims
Stonehenge Co Ltd is a company that operates in the Commercial & Residential Construction industry. It employs 250to499 people and has 10Mto25M of revenue. The company is headquartered in Phra Nakhon Si Ayutthaya, Phra Nakhon Si Ayutthaya, Thailand.
Sources
Source
Indexed 1 month agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
