Ransomware victim disclosure
← All victimsKurt J. Lesker Company
listed as lesker.com · Claimed by chaos · listed 6 months ago
Status timeline
- Listed
Dec 2, 2025
- Data leaked
At a glance
- Group
- chaos
- Status
- Data leaked
- Country
- United States
- Sector
- Technology
- Listed on leak site
- Dec 2, 2025
About the victim
AI dossier — public-source company profileKurt J. Lesker Company (KJLC), founded in 1954, is a leading manufacturer and distributor of high-quality vacuum products, including vacuum chambers, pumps, flanges, thin-film deposition systems, sputter targets, and related components. The company serves electronic, communications, semiconductor, and research industries globally, with operations across North America, Europe, and Asia. It also offers services such as pump repair, precious metal reclaim, and custom chamber fabrication.
- Industry
- Vacuum Equipment Manufacturing & Distribution
- Employees
- 201-500
- Founded
- 1954
Attack summary
Severity: high — Data has been published by the threat actor, indicating confirmed exfiltration. KJLC serves semiconductor, electronics, defense, and research sectors globally; exposure of customer, order, or technical data from such a supplier carries significant business and supply-chain risk.The Chaos ransomware group claims an attack on Kurt J. Lesker Company and has published data (disclosed status: data_published), asserting access to company data associated with its vacuum equipment manufacturing and sales operations. No ransom amount or specific data volume was stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Company business data
- Customer and order information
- Internal operational files
What the group claims
Since it's foundation in 1954, Kurt J. Lesker Company has manufactured and sold vacuum equipment and parts to the electronic and communications related industries
Sources
Source
Indexed 6 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
