Ransomware victim disclosure
← All victimsHaworth Tompkins
Claimed by Royal · listed 3 years ago
Status timeline
- Listed
May 26, 2023
- Data leaked
At a glance
- Group
- Royal
- Status
- Data leaked
- Country
- United Kingdom
- Sector
- Construction
- Listed on leak site
- May 26, 2023
- Data size
- 100 GB
About the victim
AI dossier — public-source company profileHaworth Tompkins is a Stirling Prize-winning architectural studio based in London, UK, with an international reputation for intelligent and purposeful design. The studio works across a broad range of project types including housing, cultural venues, theatres, and masterplanning, with notable projects including The Liverpool Everyman, National Theatre, and various London regeneration schemes. It operates internationally, with projects in the UK, Austria, Sweden, and Australia.
- Industry
- Architecture & Architectural Design
- Address
- 110 Golden Lane, London, EC1Y 0TL, United Kingdom
- Employees
- 51-200
Attack summary
Severity: high — 100 GB of confirmed exfiltrated data has been published, representing significant business and potentially sensitive client/employee data from a well-known architectural firm handling major public and private sector projects.The Royal ransomware group claims to have exfiltrated approximately 100 GB of data from Haworth Tompkins, with the disclosed status indicating the data has been published. No ransom amount was stated.
Data the group says was taken
AI dossier — extracted from the leak post- Internal business documents
- Project files and design data
- Potentially client and contract records
- Potentially employee personal data
What the group claims
Haworth Tompkins is a Stirling Prize-winning architectural studio with an international reputation for intelligent, purposeful design.Total downloaded data - 100gb
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
