Ransomware victim disclosure
← All victimsCarrosserie Baldinger AG
listed as baldinger-ag.ch · Claimed by apt73 · listed 23 days ago
Status timeline
- Listed
Apr 27, 2026
- Data leaked
At a glance
- Group
- apt73
- Status
- Data leaked
- Country
- CH
- Sector
- Manufacturing
- Listed on leak site
- Apr 27, 2026
About the victim
AI dossier — public-source company profileCarrosserie Baldinger AG (Baldinger Fahrzeugbau) is a Swiss vehicle body-building company headquartered in the Zürich canton, operating since 1970. The company specialises in lightweight aluminium chassis, box bodies, flatbed and special-purpose vehicle superstructures, trailers, and semi-trailers, serving a wide range of industries including logistics, bakeries, construction, and refrigerated transport. It is known for its low-loading-edge chassis designs that offer up to 25% greater payload capacity.
- Industry
- Commercial Vehicle Body Building & Custom Vehicle Conversions
- Address
- Hedingen, Zürich, Switzerland
- Founded
- 1970
Attack summary
Severity: medium — Data has reportedly been published by the threat actor, indicating confirmed exfiltration; however, no details on data volume, regulated/sensitive data categories (PII at scale, medical, financial), or operational disruption are provided, keeping this at medium rather than high or critical.The group APT73 claims to have published data belonging to Carrosserie Baldinger AG, indicating exfiltration of company data with disclosed status of 'data_published'. No ransom amount or specific data volume was stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Company data (unspecified)
What the group claims
Since 1970, Baldinger Fahrzeugbau has stood for continuous innovation and the highest quality. We...
Sources
Source
Indexed 23 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
