Ransomware victim disclosure
← All victimsHallmark Cards, Inc. & Hallmark Plus
Claimed by shinyhunters · listed 2 months ago
Status timeline
- Listed
Mar 31, 2026
- Data leaked
At a glance
- Group
- shinyhunters
- Status
- Data leaked
- Country
- United States
- Sector
- Consumer Services
- Listed on leak site
- Mar 31, 2026
About the victim
AI dossier — public-source company profileHallmark Cards, Inc. is a privately held American company headquartered in Kansas City, Missouri, best known for producing greeting cards, gifts, and related consumer products sold through retail channels worldwide. The company also operates Hallmark Plus, a subscription or loyalty service tier. Hallmark is one of the largest greeting card manufacturers in the world, with a broad retail and digital presence.
- Industry
- Greeting Cards & Consumer Gifts
- Address
- 2501 McGee Trafficway, Kansas City, Missouri 64108, United States
- Employees
- 10000+
- Founded
- 1910
Attack summary
Severity: critical — Claimed exfiltration of 7.9 million Salesforce records containing PII at scale meets the critical threshold; Salesforce CRM data typically includes customer names, contact details, purchase history, and potentially financial information across a very large customer base.ShinyHunters claims to have exfiltrated over 7.9 million Salesforce records containing personally identifiable information and internal corporate data, issuing a final deadline of 2 April 2026 for the company to respond before the data is published.
Data the group says was taken
AI dossier — extracted from the leak post- Salesforce CRM records
- Personally identifiable information (PII)
- Internal corporate data
What the group claims
Over 7.9M Salesforce records containing PII and other internal corporate data have been compromised. This is a final warning to reach out by 2 Apr 2026 before we leak along with several annoying (digital) problems that'll come your way. Make the right decision, don't be the next headline. | Updated: 31 Mar 2026 | Warning: FINAL WARNING
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
