Ransom! Avanti Windows & Doors (MAY-2026)

Ransom! Avanti Windows & Doors (MAY-2026)

Incident Details

  • Victim: Avanti Windows & Doors
  • Sector: Manufacturing
  • Country: US
  • Actor: aurora
  • Source: http://u6lieui2dakbctcjea2bz4r4q32r7t36nwljovqbv7mxs6o2smgxixid.onion/blog/avanti-windows-doors-25cc6dc6
  • Discovered: 2026-05-12T11:20:59.313304+00:00
  • Published: 2026-05-12T00:00:00+00:00

Information

  • Plaintext SQL Server SA credentials exposing the master key to the FeneVision ERP database
  • Employee SSNs, W-4s, I-9s, and E-Verify records covering the full workforce
  • 1099-MISC/INT forms containing contractor and vendor tax details and payment amounts
  • Direct deposit authorizations with bank account and routing numbers for payroll-enrolled employees
  • More than 24 months of Chase bank statements and 28 months of AMEX corporate card statements
  • The complete proprietary pricing algorithm, including FastAPI backend source code and 41+ builder MSAs
  • CPA-reviewed financial statements, partnership returns, K-1s, and budget forecasts
  • OSHA 300 logs, workers’ compensation audit files, and UHC health insurance invoices
  • Attorney-client privileged ADOSH settlement correspondence
  • About 80 Windows roaming profiles with desktops, documents, AppData, Outlook files, browser caches, and cached credentials

Disclaimer: This post is based on public claims made by the ransomware group "aurora". I cannot confirm the accuracy of the information. However, I would be happy to share any official statement from the affected organization to provide clarification.

monitored by: ransomware.live