Ransomware victim disclosure
← All victimsTexollini
Claimed by Akira · listed 2 months ago
Status timeline
- Listed
Mar 18, 2026
- Data leaked
At a glance
- Group
- Akira
- Status
- Data leaked
- Country
- United States
- Sector
- Manufacturing
- Listed on leak site
- Mar 18, 2026
- Data size
- 20 GB
About the victim
AI dossier — public-source company profileTexollini is a US-based textile manufacturer that combines fashion and technology to produce innovative materials and advanced performance textiles. Their product portfolio spans activewear, athleisure wear, swimwear, and intimate apparel, serving a variety of markets. No additional public site details were available to confirm headcount, founding date, or physical address.
- Industry
- Technical & Performance Textile Manufacturing
Attack summary
Severity: critical — The claimed exfiltration includes regulated personal data (passports, driver's licenses, medical records) constituting PII at scale, alongside sensitive financial and contractual business data, meeting the threshold for critical severity.Akira claims to have exfiltrated approximately 20 GB of corporate data from Texollini, encompassing employee identity documents, medical records, HR forms, financial files, client files, contracts, agreements, and NDAs; the group states the data will be published imminently.
Data the group says was taken
AI dossier — extracted from the leak post- Employee passports
- Driver's licenses
- Medical records
- HR forms
- Financial files
- Client files
- Contracts and agreements
- NDAs
What the group claims
Texollini is a textile manufacturer that combines fashion and tec hnology to create innovative materials and advanced performance t extiles. They offer a wide range of products including activewear , athleisure wear, swimwear, and intimate apparel, catering to va rious markets. We will upload 20gb of corporate data soon. Employee passports an d DLs, medical records, HR forms, financial files, a bit of clien t files, contracts and agreements, NDAs, etc.
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
