Cybercriminals Claim to Leak Door Controls USA’s 140GB Database on Hacker Forum

Cybercriminals Claim to Leak Door Controls USA’s 140GB Database on Hacker Forum

A 140GB archive that purportedly belongs to Door Controls USA, a US-based door parts shop, has been leaked on a popular dark web hacker forum.


According to the forum post, the archive includes confidential company data and sensitive documents related to Door Controls USA, including manufacturing blueprints, machine-readable manufacturing code, financial and accounting data, as well as various legal documents.


The archive was leaked on November 27-28. It appears to have been posted on the hacker forum after Door Controls USA seemingly refused to pay ransom to cybercriminals who breached the company’s network.



“The data is preloaded and will be automatically published if you do not pay. After publication, your data will be available for at least 6 months on our CDN servers.”


Ransomware message left on the forum post

We asked Door Controls USA if they could confirm that the leak was genuine. However, we received no response from the company.


What data has been leaked?


The leaked data appears to come from Door Controls USA, a commercial automatic and manual door part seller and manufacturer based in Ben Wheeler, Texas. Established in 1995, the company claims to offer “the widest range of products in the automatic door industry,” including door locks, bolts, checks, and more.


Based on the samples we saw from the leak, the archive appears to contain more than 140GB worth of confidential company data, split across two folders. One folder seems to hold company financials and accounting information, while the other is dedicated to sensitive research and development data, including:


Confidential product plans, models, and blueprints
Machine-readable G-code instructions for manufacturing a variety of proprietary door control mechanisms
Company campus layouts and their evacuation plans
Contracts
Financial and audit data ..

Support the originator by clicking the read the rest link below.