Ransomware victim disclosure
← All victimsTexwipe
listed as The Texwipe · Claimed by Blackbyte · listed 3 years ago
Status timeline
- Listed
Jun 14, 2023
- Data leaked
At a glance
- Group
- Blackbyte
- Status
- Data leaked
- Country
- United States
- Sector
- Manufacturing
- Listed on leak site
- Jun 14, 2023
About the victim
AI dossier — public-source company profileTexwipe is a US-based manufacturer and global market leader in contamination control supplies and critical cleaning products, including cleanroom wipers, swabs, disinfectants, mops, and sterile products. Founded in 1964 and headquartered in Kernersville, North Carolina, the company serves industries such as pharmaceuticals, aerospace, medical devices, and microelectronics. Texwipe operates internationally with offices in EMEA, China, and the Philippines.
- Industry
- Cleanroom Contamination Control Products Manufacturing
- Address
- 1210 S Park Dr, Kernersville, NC 27284, United States
- Founded
- 1964
Attack summary
Severity: high — Data has been confirmed published by the ransomware operator (disclosed status: data_published), indicating successful exfiltration and public release of business data, which constitutes significant harm even without explicit enumeration of data types.BlackByte claims an attack on Texwipe with a disclosed status of data_published, indicating data has been exfiltrated and published. No specific data categories or size were stated in the post, but the disclosure status implies sensitive company data has been released.
Data the group says was taken
AI dossier — extracted from the leak post- Company data (unspecified)
What the group claims
Founded in 1964, Texwipe is a company that specializes in manufacturing cleanroom products. The company is headquartered in Kernersville, North Carolina.
Sources
- Victim sitetexwipe.com
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
