Ransomware victim disclosure
← All victimsSitoy Group Holdings Limited
listed as sitoy.com · Claimed by Abyss · listed 4 months ago
Status timeline
- Listed
Jan 26, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileSitoy Group Holdings Limited, founded in 1968 and listed in Hong Kong, is one of the world's leading OEM/ODM manufacturers of branded bridge-to-luxury handbags, small leather goods, and travel goods, serving major international fashion houses. The company also operates its own retail brands including Tuscan's and Fashion & Joy across Hong Kong and mainland China. Its principal manufacturing operations are based in Dongguan, China.
- Industry
- Luxury & Bridge Handbags, Leather Goods & Travel Goods Manufacturing
- Address
- Houjie, Dongguan, Guangdong, China (principal manufacturing); listed in Hong Kong S.A.R.
- Employees
- 1001-5000
- Founded
- 1968
Attack summary
Severity: high — Data has been confirmed as published by the threat actor, indicating successful exfiltration from a significant multinational manufacturing and retail company. This likely includes business-sensitive data such as client lists (major luxury brands), financial records, and employee PII, representing substantial business and reputational harm.The Abyss ransomware group claims to have attacked Sitoy Group and has published data (disclosed status: data_published), indicating exfiltration of company data. No specific ransom amount or data volume has been stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate business data
- Manufacturing records
- Customer and client information
- Financial records
- Employee information
What the group claims
Founded in 1968, Sitoy Group is engaged in the design, research, development, manufacturing, sale, wholesaling, and retailing of handbags, small leather goods, travel goods, and footwear products.
Sources
- Victim sitesitoy.com
Source
Indexed 4 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
