Ransomware victim disclosure
← All victimsRIC Electronics Ltd.
listed as RIC Electronics (ricelectronics.com) · Claimed by Rancoz · listed 3 years ago
Status timeline
- Listed
May 5, 2023
- Data leaked
At a glance
- Group
- Rancoz
- Status
- Data leaked
- Country
- United States of America
- Sector
- Manufacturing
- Listed on leak site
- May 5, 2023
About the victim
AI dossier — public-source company profileRIC Electronics Ltd. is a Canadian company headquartered in Burnaby, British Columbia, specializing in the research, development, engineering, and manufacturing of industrial-grade AC and DC power systems since 1981. Their product portfolio includes mobile battery power centers, utility-scale energy storage and delivery systems, chargers and rectifiers, DC and AC UPS systems, and converters and inverters. They serve sectors including marine, defense, utility, telecom, oil and gas, and mining, and hold ISO 9001:2015 certification.
- Industry
- Industrial Electrical Power Systems Manufacturing
- Address
- Unit 307 - 6741 Cariboo Rd, Burnaby, BC, Canada
- Founded
- 1981
Attack summary
Severity: high — Data has been confirmed as published (data_published status), indicating successful exfiltration. RIC Electronics serves defense, utility, oil and gas, and other critical infrastructure sectors, elevating the sensitivity of potentially exposed business data such as technical designs, client lists, and proprietary product specifications.The Rancoz ransomware group claims an attack on RIC Electronics and has disclosed the status as data_published, indicating that data has been exfiltrated and published. The specific data types and volumes have not been enumerated in the leak post.
Data the group says was taken
AI dossier — extracted from the leak post- Company data (unspecified)
What the group claims
Electrical Equipment Manufacturing
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
