Ransomware victim disclosure
← All victimsUniversal Mailing Service, Inc.
listed as Universal Mailing Service · Claimed by securotrop · listed 3 months ago
Status timeline
- Listed
Feb 19, 2026
- Data leaked
At a glance
- Group
- securotrop
- Status
- Data leaked
- Country
- United States
- Sector
- Business Services
- Listed on leak site
- Feb 19, 2026
- Data size
- 490 GB
About the victim
AI dossier — public-source company profileUniversal Mailing Service, Inc. (UMS) is a Piscataway, New Jersey-based end-to-end direct mail and multi-channel marketing company. For over four decades, UMS has provided services including printing and mailing, variable data imaging, data analytics, email marketing, digital and social media advertising, and fulfillment. The company positions itself as a single-source partner for businesses seeking integrated direct mail and digital marketing campaigns.
- Industry
- Direct Mail & Multi-Channel Marketing Services
- Address
- 10 New England Avenue, Piscataway, NJ 08854-4101
Attack summary
Severity: critical — 490 GB of published data from a direct mail and marketing services firm almost certainly contains large volumes of consumer PII (names, addresses, demographic data) belonging to UMS clients' customers, constituting regulated data exposure at scale. The company also references CIGNA health plan compliance files, suggesting possible exposure of health-related data.The ransomware group securotrop claims to have exfiltrated approximately 490 GB of data from Universal Mailing Service, with the disclosure status listed as data_published, indicating the data has been or is being released. The leak post itself is minimal, showing a status of 'AWAITING' with no additional detail on encryption or specific data categories.
Data the group says was taken
AI dossier — extracted from the leak post- Client marketing data
- Consumer PII (mailing lists, prospect lists)
- Variable data imaging records
- Business operational files
- Potentially employee records
What the group claims
Status: AWAITING Size: 490 GB
Sources
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
