Ransomware victim disclosure
← All victimsIndustrial Heat Transfer, Inc.
listed as Industrial Heat Transfer (iht-inc.com) · Claimed by Rancoz · listed 3 years ago
Status timeline
- Listed
Jul 7, 2023
- Data leaked
At a glance
- Group
- Rancoz
- Status
- Data leaked
- Country
- United States
- Sector
- Manufacturing
- Listed on leak site
- Jul 7, 2023
About the victim
AI dossier — public-source company profileIndustrial Heat Transfer, Inc. (IHT) is a Wisconsin-based manufacturer specializing in custom commercial and industrial continuous-fin heat exchangers. The company serves a broad range of markets including gas turbine, military (CAGE CODE 0ASU6), compressor, motor/generator, and waste heat recovery applications from a 13,000-square-foot facility. IHT is certified to ASME Section VIII Div. I and multiple military specifications (MIL-STD-248, MIL-C-19836).
- Industry
- Custom Industrial Heat Exchanger Manufacturing
- Address
- Wisconsin, United States (exact street address not publicly stated; 13,000-sq-ft facility in Wisconsin)
Attack summary
Severity: high — Data has been published (disclosed status: data_published), and the victim manufactures equipment to military specifications with an active DoD CAGE code, meaning exfiltrated data could include sensitive defense-related engineering and contractual information. This elevates severity beyond medium even absent explicit data volume details.The Rancoz ransomware group claims to have attacked Industrial Heat Transfer, Inc. and lists the disclosure status as data_published, indicating that stolen data has been released. No specific details on ransom amount, data volume, or precise data categories were included in the leak post.
Data the group says was taken
AI dossier — extracted from the leak post- Company business data
- Potentially proprietary engineering/design files
- Customer records
- Internal operational documents
What the group claims
Custom Heat Exchanger Manufacturer
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
