Benchmark Electronics Data Breach: The Everest Ransomware Group Strikes Again

By Thomas | Published on December 10, 2025

Cybercrime

Benchmark Electronics, a prominent technology and manufacturing solutions provider, has reportedly become the latest target of a high-profile cyberattack. The ransomware group Everest claims to have infiltrated the company’s systems and obtained vast amounts of sensitive engineering and manufacturing data. With threats of public disclosure looming, the breach raises serious concerns about intellectual property security and the potential exposure of proprietary technologies critical to industries ranging from aerospace to telecommunications.

About Benchmark Electronics

Benchmark Electronics, founded in 1979 and based in Tempe, Arizona, designs and builds complex electronic systems for a range of industries, including aerospace, medical devices, semiconductor equipment, and industrial technology. The company handles everything from engineering and prototyping to assembly, testing, and ongoing support, helping its clients bring products to market. With over 10,000 employees across most continents, Benchmark Electronics isn’t a household name, but it plays a crucial role behind the scenes in the global electronics supply chain, holding the key to some of the worlds most advanced manufacturing technologis.

The Data Breach

In a stunning revelation, the Everest ransomware group claims to have stolen more than 100,000 files from Benchmark Electronics, spanning a wide range of technical, manufacturing, and business-critical documents. The stolen data reportedly includes a mix of proprietary designs, engineering blueprints, and schematics for products produced by Benchmark for its clients. The files are said to cover various industries, from aerospace and defense to robotics and telecommunications, raising the stakes for the affected organizations.

Among the major companies listed as impacted by the leak are industry giants like Amazon Prime AIR, Honeywell, Yamaha Robotics, Hitachi, Caterpillar, ASML, and NEC Corporation, to name a few. The breadth of these organizations suggests that the stolen data is far-reaching, potentially affecting a wide array of sectors from aviation and robotics to energy and consumer electronics. The exposed files come in an array of formats, such as Gerber files for circuit board layouts, CAD designs, Bill of Materials document, firmware files, and schematics, just to name just a few.

The stolen files contain highly sensitive materials that could reveal critical details about manufacturing processes and product designs. With exposed documents ranging from intricate circuit board layouts to proprietary CAD designs, these files hold the potential to compromise intellectual property, trade secrets, and security measures. The release of such confidential information could allow competitors or malicious actors to replicate or exploit key technologies, posing significant risks to the affected companies and their customers.

Everest's Demands

As part of their typical extortion strategy, the Everest ransomware group has set a countdown clock on their dark web portal, demanding that Benchmark Electronics pay a ransom to prevent the public release of the stolen data. The group’s message is clear: if the demands are not met by the specified deadline, they will proceed with the full leak of over 100,000 files. In a further twist, Everest has offered affected companies the opportunity to negotiate directly, allowing them to request the removal of specific files linked to their interests before the data is made public. This tactic not only pressures Benchmark into responding quickly but also creates an opportunity for other impacted organizations to safeguard their confidential information from widespread exposure, further intensifying the stakes for all parties involved.

Conclusion

The Benchmark Electronics breach is just the latest in a growing wave of cyberattacks carried out by the notorious Everest ransomware group. Over the past few months, the gang has been relentless, especially in targeting critical infrastructure and high-profile companies. From disrupting European airports to stealing massive amounts of data from ASUS, Everest has been escalating its operations, often using countdown clocks to add pressure and force negotiations. The attack on Benchmark Electronics underscores the increasing threat ransomware groups pose to both industrial giants and their global networks. As Everest continues to target vulnerable sectors, companies must remain vigilant and take proactive steps to protect sensitive data from these high-stakes extortion tactics.

Similar Articles

0 Comments

No comments yet. Be the first one to comment!