The Fulgar data breach has raised major cybersecurity concerns across the European textile industry. Fulgar S.p.A., an Italian-based manufacturer specializing in polyamide yarns and advanced textile fibers, has reportedly fallen victim to a RansomHouse ransomware attack. According to emerging reports, the attackers claim to have stolen sensitive data, including internal production documentation, business contracts, and employee information. The stolen material allegedly includes product formulas, customer orders, and confidential technical specifications used in Fulgar’s eco-friendly product lines such as Q-CYCLE and AMNI SOUL ECO.
Background on Fulgar S.p.A.
Fulgar S.p.A. is a global textile leader headquartered in Italy, recognized for its commitment to sustainability, innovation, and technical excellence. Founded in 1970, the company has become one of the most important players in the development and production of nylon 6.6 and covered yarns for use in both fashion and performance industries. Fulgar partners with leading fashion brands, sportswear manufacturers, and industrial clients to provide high-quality materials that balance performance and environmental impact.
Through its eco-friendly textile solutions, including the Q-CYCLE and AMNI SOUL ECO fibers, Fulgar has earned international recognition for advancing biodegradable and recyclable materials in the fashion and technical fabric sectors. The company’s operations span multiple countries and employ more than 600 workers globally, with a significant production footprint in Italy.
The organization’s official website, fulgar.com, serves as a platform showcasing its sustainable manufacturing initiatives and ongoing projects. However, the recent Fulgar data breach has disrupted its otherwise strong reputation for quality and innovation.
Details of the Fulgar Data Breach
The RansomHouse ransomware group has claimed responsibility for the incident involving Fulgar S.p.A. Cybersecurity analysts monitoring the situation confirmed that a portion of the company’s internal data was allegedly exfiltrated before encryption. The group often targets mid- to large-scale enterprises that manage sensitive design and production information, typically demanding cryptocurrency payments in exchange for data deletion or non-disclosure.
- Threat Actor: RansomHouse
- Date Reported: November 12, 2025
- Location: Mantova, Italy
- Industry: Textile and Manufacturing
- Leaked Data: Internal project files, manufacturing blueprints, supplier data, client agreements, and employee records
The Fulgar data breach appears to be part of a wider ransomware campaign targeting European manufacturing and materials engineering firms. Researchers suspect that RansomHouse may have gained access through a compromised VPN account or misconfigured remote access server used by the company’s production management team.
Impact on the Textile Manufacturing Sector
The attack on Fulgar highlights the growing cyber risk within industrial sectors that rely heavily on automation and digital resource planning systems. Textile manufacturing, once considered a low-risk sector, has become a prime target for ransomware operators who see opportunities to disrupt global supply chains and extort high-value payments from specialized manufacturers.
The potential exposure of intellectual property is particularly concerning. Fulgar’s proprietary formulas for polyamide yarns and sustainable fiber innovations could be valuable to competitors or counterfeiters if leaked publicly. Similarly, stolen supply chain documentation and client order histories could reveal sensitive trade relationships and pricing structures within the European textile market.
Beyond intellectual property loss, there is also a significant privacy component to the Fulgar data breach. Early analysis suggests that personal information belonging to employees and contractors, such as names, national identification numbers, payroll details, and corporate email accounts, may have been included in the stolen files. Such information could be exploited in phishing campaigns or identity theft operations if not properly secured.
Response and Company Actions
As of this publication, Fulgar has not released an official statement acknowledging or denying the data breach. Attempts to contact the company through official channels have not yet been met with a public response. Industry insiders report that production systems remain operational, suggesting the ransomware incident may have been limited to internal file servers or backup infrastructure.
In similar incidents involving the RansomHouse ransomware group, threat actors often attempt to negotiate privately with the victim organization before publicly leaking sample data. The Fulgar data breach listing reportedly includes preview files on the group’s leak portal, indicating that the attackers intend to publish further materials if their ransom demands are not met.
Cybersecurity experts recommend that Fulgar immediately isolate affected systems, engage digital forensics specialists, and implement enhanced endpoint monitoring to identify any persistent threats or secondary infections. It is also advised that the company coordinate with Italian law enforcement and the European Union Agency for Cybersecurity (ENISA) to mitigate further risks and comply with reporting obligations under the EU’s General Data Protection Regulation (GDPR).
Possible Legal and Regulatory Consequences
Under the GDPR framework, the Fulgar data breach qualifies as a major security incident involving the unauthorized access and exfiltration of personal and corporate data. Depending on the extent of the exposure, the company could face regulatory scrutiny and significant financial penalties for inadequate data protection practices. Fulgar will likely be required to notify affected individuals and regulatory bodies within 72 hours of verifying the breach.
Furthermore, if any third-party contractors or international partners were impacted, cross-border data transfer regulations may come into play. This could prompt investigations from authorities in other jurisdictions that maintain relationships with Fulgar’s supply chain. The incident also risks damaging the trust of its business partners, particularly luxury fashion and performance fabric brands that depend on the confidentiality of Fulgar’s material technology.
Industry Reactions and Expert Insights
Cybersecurity analysts have noted that RansomHouse has been increasingly active in Europe throughout 2025, targeting mid-sized industrial firms in sectors such as textiles, manufacturing, and automotive components. The group’s pattern of stealing sensitive information before encryption allows them to apply double extortion pressure even when victims can restore operations from backups.
Commenting on the Fulgar data breach, several experts emphasized that ransomware operators are evolving their tactics to exploit weak segmentation in production networks. Many manufacturing firms, including textile companies, maintain outdated systems that lack proper security patching or rely on legacy software for machine control. These weaknesses create exploitable entry points for attackers using stolen credentials or phishing-based intrusion campaigns.
Analysts also warn of potential downstream effects on global textile supply chains. Disruption at a specialized materials producer like Fulgar could temporarily affect deliveries to fashion and technical wear companies across Europe, particularly those dependent on sustainable nylon alternatives that Fulgar is known for producing.
Mitigation Steps and Recommendations
For Fulgar S.p.A.
- Engage a digital forensics and incident response team to assess the full scope of the compromise.
- Reset all internal and external user credentials, particularly for remote access systems.
- Implement network segmentation and enhanced endpoint detection tools to prevent lateral movement.
- Notify employees, suppliers, and customers of the potential exposure of personal and corporate data.
- Collaborate with national cybersecurity authorities to identify and block further exfiltration attempts.
For Other Textile and Industrial Companies
- Conduct regular cybersecurity audits and penetration tests to identify vulnerabilities in operational technology networks.
- Restrict VPN access to authorized personnel using multi-factor authentication and strict session timeouts.
- Implement offline backups and ensure that restoration procedures are tested regularly.
- Provide employee training programs to recognize phishing emails and social engineering tactics.
- Monitor the dark web for any leaked documents or credentials tied to corporate domains.
Broader Implications for European Manufacturing
The Fulgar data breach underscores a rising trend of ransomware activity against European manufacturers that specialize in high-value materials. As industries continue their digital transformation, attackers increasingly target hybrid networks combining production automation with cloud-based management systems. The lack of robust cybersecurity investment in traditional sectors like textiles leaves many firms exposed to evolving threats.
For Italy, this incident serves as a wake-up call for both private and public sectors to prioritize digital risk management. As one of Europe’s largest producers of fashion and industrial materials, Italy’s manufacturing ecosystem could become a repeating target for ransomware groups if comprehensive national defenses are not strengthened.
While the investigation into the Fulgar data breach continues, security professionals urge all similar enterprises to review their infrastructure security policies, adopt modern detection technologies, and prepare for potential ransomware events that may follow similar intrusion methods.
For ongoing coverage of verified data breaches and critical cybersecurity incidents affecting the global manufacturing sector, visit Botcrawl for expert updates and in-depth reporting on digital threats worldwide.

