Ransomware victim disclosure
← All victimsLacoste
Claimed by lapsus$ · listed 3 months ago
Status timeline
- Listed
Mar 1, 2026
- Data leaked
At a glance
- Group
- lapsus$
- Status
- Data leaked
- Country
- France
- Sector
- Consumer Services
- Listed on leak site
- Mar 1, 2026
About the victim
AI dossier — public-source company profileLacoste is a French luxury apparel and lifestyle brand founded in 1933 by tennis player René Lacoste and André Gillier, best known for its iconic green crocodile logo. The company designs and sells clothing, footwear, sportswear, eyewear, leather goods, and perfumes across international markets through department stores, shopping malls, and standalone boutiques. It is headquartered in Paris, France.
- Industry
- Luxury Apparel & Lifestyle Goods
- Employees
- 1001-5000
- Founded
- 1933
Attack summary
Severity: medium — Data is marked as published by a known and credible threat actor (Lapsus$), indicating some level of exfiltration has occurred; however, no specific data types, scale, or regulated/sensitive data categories are described in the leak post, preventing a higher severity classification.The Lapsus$ group claims to have attacked Lacoste and has published data ('data_published' status), though the leak post provides no specific detail on whether encryption or exfiltration occurred, nor the nature or volume of data involved.
Original description
AI-summarised, not from the leak postLacoste is a high-end French clothing company founded in 1933 by tennis player René Lacoste and André Gillier. The company is renowned for its iconic green crocodile logo. They primarily produce clothing, footwear, sportswear, eyewear, leather goods, and perfumes. Its polo shirts are particularly popular. Lacoste products are sold internationally at various department stores, shopping malls, and standalone boutiques.
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
