Instyle Solar: Exclusive: Textile supplier Instyle listed by INC Ransom hackers

Instyle Solar: Exclusive: Textile supplier Instyle listed by INC Ransom hackers

The INC Ransom ransomware operation has allegedly hacked the Australia-based textile wholesaler, Instyle.

The hackers listed the company, which is headquartered in Mascot, NSW, on 3 December, claiming later on the same day to have stolen 62 gigabytes of data.

By becoming a member, I agree to receive information and promotional messages from Cyber Daily. I can opt out of these communications at any time. For more information, please visit our Privacy Statement.

If you check the box above before you log in, you won’t have to log back into the website next time you return, even if you close your browser and come back later.

If you check this box before you log in, you won’t have to log back into the website next time you return, even if you close your browser and come back later.

Keep me signed in on this device.

To continue reading the rest of this article, please log in.

According to INC Ransom’s leak post, the data includes customer information, human resources data, and financial details. The cyber criminals have not shared any evidence of the hack; however, a countdown suggests the allegedly stolen data will be published within days.

INC Ransom did not share any details of its ransom demand.

Instyle is INC Ransom’s second Australian victim in almost as many days. The group listed popular fashion retailer Oxford on 1 December and claimed to have stolen more than 100 gigabytes of data a day later. The nature of the data appears to be much the same as that allegedly s

Source: https://www.cyberdaily.au/security/12977-exclusive-textile-supplier-instyle-listed-by-inc-ransom-hackers

Instyle Solar cybersecurity rating report: https://www.rankiteo.com/company/instyle-solar

"id": "INS1764914724",
"linkid": "instyle-solar",
"type": "Ransomware",
"date": "12/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': None,
                                     'industry': 'Textile',
                                     'location': 'Mascot, NSW, Australia',
                                     'name': 'Instyle',
                                     'size': None,
                                     'type': 'Textile Wholesaler'}],
              'data_breach': {'data_encryption': None,
                              'data_exfiltration': 'Yes',
                              'file_types_exposed': None,
                              'number_of_records_exposed': None,
                              'personally_identifiable_information': 'Yes',
                              'sensitivity_of_data': 'High',
                              'type_of_data_compromised': ['Customer '
                                                           'information',
                                                           'Human resources '
                                                           'data',
                                                           'Financial '
                                                           'details']},
              'date_detected': '2023-12-03',
              'date_publicly_disclosed': '2023-12-03',
              'description': 'The INC Ransom ransomware operation has '
                             'allegedly hacked the Australia-based textile '
                             'wholesaler, Instyle. The hackers listed the '
                             'company on 3 December, claiming to have stolen '
                             '62 gigabytes of data, including customer '
                             'information, human resources data, and financial '
                             'details.',
              'impact': {'brand_reputation_impact': None,
                         'conversion_rate_impact': None,
                         'customer_complaints': None,
                         'data_compromised': '62 GB',
                         'downtime': None,
                         'financial_loss': None,
                         'identity_theft_risk': 'High',
                         'legal_liabilities': None,
                         'operational_impact': None,
                         'payment_information_risk': 'High',
                         'revenue_loss': None,
                         'systems_affected': None},
              'initial_access_broker': {'backdoors_established': None,
                                        'data_sold_on_dark_web': None,
                                        'entry_point': None,
                                        'high_value_targets': None,
                                        'reconnaissance_period': None},
              'investigation_status': 'Ongoing',
              'motivation': 'Financial gain',
              'post_incident_analysis': {'corrective_actions': None,
                                         'root_causes': None},
              'ransomware': {'data_encryption': None,
                             'data_exfiltration': 'Yes',
                             'ransom_demanded': None,
                             'ransom_paid': None,
                             'ransomware_strain': 'INC Ransom'},
              'references': [{'date_accessed': '2023-12-03',
                              'source': 'Cyber Daily',
                              'url': None}],
              'regulatory_compliance': {'fines_imposed': None,
                                        'legal_actions': None,
                                        'regulations_violated': None,
                                        'regulatory_notifications': None},
              'response': {'adaptive_behavioral_waf': None,
                           'communication_strategy': None,
                           'containment_measures': None,
                           'enhanced_monitoring': None,
                           'incident_response_plan_activated': None,
                           'law_enforcement_notified': None,
                           'network_segmentation': None,
                           'on_demand_scrubbing_services': None,
                           'recovery_measures': None,
                           'remediation_measures': None,
                           'third_party_assistance': None},
              'threat_actor': 'INC Ransom',
              'title': 'INC Ransomware Attack on Instyle',
              'type': 'Ransomware'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.