RO
Ransomware Victim Manufacturing

Rohner

Ransomware attack by Rhysida Β· Disclosed February 23, 2026 Β· πŸ‡¨πŸ‡­ Switzerland

Date Disclosed
Feb 23, 2026
2026
Threat Group
Rhysida
190 total victims
Industry
Manufacturing

Incident Analysis

Rohner was targeted by Rhysida ransomware, one of the most active ransomware groups in our database with 190 confirmed victims globally. The attack was disclosed on February 23, 2026, when Rohner appeared on the group's dark web leak site.

Rohner is based in Switzerland , operating in the Manufacturing sector. Switzerland ranks #13 globally for ransomware attacks, with 142 victims in our database.

Sector context: Manufacturing companies are frequently targeted because production downtime directly translates to financial loss. Ransomware operators exploit this time-sensitivity to demand higher ransoms and faster payment.

Rhysida typically employs a double extortion model: first exfiltrating sensitive data from the victim's systems, then deploying ransomware to encrypt files. Victims face two simultaneous threats β€” paying to restore access and paying to prevent publication of stolen data. The group's leak site publishes victim names and exfiltrated data as leverage.

Data source: This incident record is sourced from public ransomware group leak site disclosures aggregated via the ransomware.live API. Disclosure date reflects when the victim was published on the leak site, which may differ from the initial date of compromise. This platform does not publish or link to stolen data. Last data update: Apr 21, 2026 18:01 UTC.

Frequently Asked Questions

Was Rohner attacked by ransomware?

Yes. Rohner was listed as a victim of the Rhysida ransomware group on February 23, 2026. The organisation is based in Switzerland and operates in the Manufacturing sector. The disclosure appeared on the group's dark web leak site.

Which ransomware group attacked Rohner?

Rohner was attacked by Rhysida ransomware. Rhysida is one of the most active ransomware groups, having claimed 190 victims globally. The group typically employs a double-extortion model: encrypting the victim's files and threatening to publish stolen data.

When did the Rohner ransomware attack occur?

The ransomware attack on Rohner was disclosed on February 23, 2026. This date reflects when the victim was published on the threat group's leak site, which may differ from the actual date of initial compromise.

What data was stolen in the Rohner ransomware attack?

The specific data stolen from Rohner has not been independently verified by this platform. Ransomware groups typically exfiltrate data before encrypting systems and use the threat of publication to pressure victims. As a Manufacturing organisation, Rohner likely held sensitive business data, client information, and operational records.

How can organisations protect against Rhysida attacks?

To defend against Rhysida and similar threat actors, organisations should: maintain regular offline backups tested for restoration; implement network segmentation to limit lateral movement; deploy multi-factor authentication on all remote access; use endpoint detection and response (EDR) tools; conduct regular phishing and security awareness training; and monitor threat intelligence feeds for indicators of compromise (IOCs) associated with active groups.