Ransomware victim disclosure
← All victimsInterface, Inc.
listed as Interface · Claimed by Hiveleak · listed 3 years ago
Status timeline
- Listed
Dec 20, 2022
- Data leaked
At a glance
- Group
- Hiveleak
- Status
- Data leaked
- Country
- United States
- Sector
- Manufacturing
- Listed on leak site
- Dec 20, 2022
About the victim
AI dossier — public-source company profileInterface, Inc. is a global publicly traded flooring company (NASDAQ: TILE) headquartered in Atlanta, Georgia, specializing in carbon-neutral carpet tile, luxury vinyl tile (LVT), and resilient rubber flooring (nora brand). The company operates manufacturing facilities and sales offices worldwide and is known for its sustainability commitments, including carbon-neutral and CO2-negative products.
- Industry
- Flooring Manufacturing (Carpet Tile & Resilient Flooring)
- Address
- 2859 Paces Ferry Road SE, Suite 2000, Atlanta, GA 30339, United States
- Employees
- 4000
- Founded
- 1973
Attack summary
Severity: high — Confirmed exfiltration from a publicly traded global manufacturing company with imminent publication of 30% of stolen data; breach of a NASDAQ-listed firm likely involves significant business, financial, and employee data, though no explicit regulated PII at scale is confirmed yet.The Hiveleak ransomware group claims to have exfiltrated data from Interface, Inc. and states that 30% of the stolen data will be published imminently, indicating confirmed exfiltration with imminent data disclosure; no encryption claim is explicitly stated.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate business data
- Financial records (publicly traded company)
- Operational/manufacturing data
- Employee data
- Customer/partner records
What the group claims
**** 30% OF THE DATA IS COMING SOON **** Interface, Inc. is a global flooring company specializing in carbon neutral carpet tile and resilient flooring. Stocks: NASDAQ: TILE Equity: IF6N.F, IF6N.BE, IF6N.HA
Sources
- Victim siteinterface.com
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
