The RansomHouse ransomware group has claimed responsibility for a cyberattack against Fulgar S.p.A., a prominent Italian textile supplier for major fashion brands including H&M, Adidas, and Wolford. The incident, which Fulgar confirmed on November 3, 2025, is a stark example of a supply chain attack, where threat actors target a less-secure third-party supplier to indirectly impact larger, more valuable organizations. RansomHouse has reportedly leaked sensitive corporate and partner data, causing operational disruption for Fulgar and posing a significant downstream risk to its high-profile customers. The attack underscores the increasing focus of ransomware groups on the interconnected vulnerabilities within global commercial supply chains.
Threat Actor: RansomHouse is a data-extortion group that focuses on stealing data and threatening to leak it, rather than just encrypting files. They often claim to be "penetration testers" who are simply pointing out security flaws, a narrative used to pressure victims into paying.
Victim: Fulgar S.p.A. is a critical link in the fashion supply chain, known for producing innovative and sustainable yarns. Its compromise directly affects the production capabilities and proprietary information of its partners.
Attack Vector: The specific initial access vector was not detailed in the reports, but such attacks typically involve phishing, exploitation of unpatched vulnerabilities, or compromised credentials.
TTPs:
T1078 - Valid Accounts: Likely used compromised credentials for initial access or lateral movement.T1537 - Transfer Data to Cloud Account or similar exfiltration methods were used to steal sensitive data.T1486 - Data Encrypted for Impact: While known as an extortion group, ransomware deployment is a common tactic.T1657 - Financial Theft: The ultimate goal is extortion.This attack is part of a broader trend of targeting third-party suppliers, as seen in previous attacks against conglomerates like Kering and LVMH.
The impact of the Fulgar breach extends far beyond the company itself.
No specific Indicators of Compromise were provided in the source articles.
Detection (for suppliers like Fulgar):
User Data Transfer Analysis (D3-UDTA).Detection (for customers like H&M/Adidas):
Response:
For Suppliers (like Fulgar):
M1051 - Update Software), MFA (M1032 - Multi-factor Authentication), and network segmentation.For Customers (like H&M/Adidas):
Regularly scan for vulnerabilities within the supplier's network to prevent initial compromise.
Segment networks to prevent an attacker from moving from a less secure environment to critical data stores.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats