Ransomware victim disclosure
← All victimsNorthern Technologies International Corporation
listed as ntic.com · Claimed by chaos · listed 3 months ago
Status timeline
- Listed
Feb 26, 2026
- Data leaked
At a glance
- Group
- chaos
- Status
- Data leaked
- Country
- United States
- Sector
- Technology
- Listed on leak site
- Feb 26, 2026
About the victim
AI dossier — public-source company profileNorthern Technologies International Corporation (NTIC) is a publicly traded specialty chemical company headquartered in the United States that develops and markets proprietary environmentally beneficial products and services focused on corrosion prevention and protection solutions. The company specializes in innovative rust and corrosion prevention technologies, selling into industrial and commercial markets. NTIC operates internationally through a network of subsidiaries and joint ventures.
- Industry
- Specialty Chemicals & Corrosion Prevention
- Employees
- 51-200
- Founded
- 1970
Attack summary
Severity: high — Data has been published (disclosed status is data_published) by the threat actor, confirming exfiltration of business data from a publicly traded specialty chemical company, which likely includes sensitive business, financial, and potentially regulated information.The Chaos ransomware group claims to have attacked NTIC and has published data, indicating exfiltration of company data; no ransom amount was stated and no specific data volume was disclosed.
Data the group says was taken
AI dossier — extracted from the leak post- Internal company files
- Proprietary chemical/product data
What the group claims
Northern Technologies International Corporation (NTIC) is a specialty chemical company that develops and markets proprietary environmentally beneficial products and services focused on corrosion prevention and protection solutions. The company specializes in innovative rust and corrosion prevention…
Sources
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
