Ransomware victim disclosure
← All victimsNothing Technology Limited
listed as Nothing · Claimed by incransom · listed 1 day ago
Status timeline
- Listed
May 19, 2026
- Data leaked
At a glance
- Group
- incransom
- Status
- Data leaked
- Country
- TW
- Sector
- Technology
- Listed on leak site
- May 19, 2026
About the victim
AI dossier — public-source company profileNothing Technology Limited is a London-based consumer electronics company founded by Carl Pei, known for designing and manufacturing smartphones, earbuds, and other connected devices under the 'Nothing' brand. The company operates globally with a focus on transparent design and software integration. It markets products such as the Nothing Phone and Ear series internationally.
- Industry
- Consumer Electronics & Technology
- Employees
- 201-500
- Founded
- 2020
Attack summary
Severity: high — Confirmed exfiltration of 52 GB of significant business data including NDAs, financial records, client data, and proprietary technology files from a publicly known consumer electronics company; data is reported as published.The group claims to have exfiltrated approximately 52 GB of data including confidential documents, client data, NDAs, financial data, operational records, corporate data, business agreements, and technology-related files. The post is marked as data_published, indicating the data has been or is being released.
Data the group says was taken
AI dossier — extracted from the leak post- Confidential documents
- Client data
- NDAs
- Financial data
- Operational records
- Corporate data
- Business agreements
- Technology files
What the group claims
NOTHING Website: https://nothing.tech/ https://www.zoominfo.com/c/nothing/557232902 WE HAS COLLECTED SUCH DATA AS: - Confidential documents - Clients Data - NDA - Financial data - Operations - Corporate data - Business Agreements - Technology - Total: 52GB And a lot of other VERY IMPORTANT information!
Sources
Source
Indexed 1 day agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
