Ransomware victim disclosure
← All victimsSahara Air Products
Claimed by nightspire · listed 1 month ago
Status timeline
- Listed
Apr 11, 2026
- Data leaked
At a glance
- Group
- nightspire
- Status
- Data leaked
- Country
- US
- Sector
- Manufacturing
- Listed on leak site
- Apr 11, 2026
About the victim
AI dossier — public-source company profileSahara Air Products, a division of Henderson Engineering Co., Inc., is a Sandwich, Illinois-based manufacturer specializing in regenerative compressed air dryers and air treatment systems. Founded in 1957 by Joe Henderson, the company has over 65 years of experience providing engineered solutions for industrial air systems. It is ISO 9001 certified and has been featured on Fox Business Network's 'Manufacturing Marvels.'
- Industry
- Industrial Air Drying & Compressed Air Treatment Equipment Manufacturing
- Address
- 95 N. Main St., Sandwich, IL 60548
- Founded
- 1957
Attack summary
Severity: high — Confirmed exfiltration and publication of sensitive business data including proprietary technical drawings (potential trade secrets), customer invoices (financial/PII), and shipment histories. The combination of intellectual property and customer-identifiable commercial records constitutes significant business data exposure.The Nightspire ransomware group claims to have exfiltrated data from Sahara Air Products, with the disclosed status indicating data has been published. The stolen data reportedly includes confidential technical drawings, internal documents, customer invoices, and shipment histories.
Data the group says was taken
AI dossier — extracted from the leak post- Confidential technical drawings
- Internal documents
- Customer invoices
- Shipment histories
What the group claims
- Confidential Technical Drawings- Documents- Customer invoices- Shipment Histories
Sources
- Victim sitesaharahenderson.com
Source
Indexed 1 month agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
