Ransomware victim disclosure
← All victimsUS Liner Company & American Made LLC
Claimed by 0Mega · listed 3 years ago
Status timeline
- Listed
Oct 4, 2023
- Data leaked
At a glance
- Group
- 0Mega
- Status
- Data leaked
- Country
- United States
- Sector
- Manufacturing
- Listed on leak site
- Oct 4, 2023
About the victim
AI dossier — public-source company profileUS Liner Company & American Made LLC appears to be a US-based industrial manufacturing firm specializing in advanced materials and thermoplastic composite solutions. The company is involved in industrial engineering and the production of composite liner products. No public website content was available to further verify scale or headquarters location.
- Industry
- Thermoplastic Composite Materials Manufacturing
Attack summary
Severity: high — Data has been confirmed published (data_published status) by the threat actor, indicating successful exfiltration of business and potentially proprietary industrial engineering and materials data from a manufacturing firm. While no regulated PII at scale is explicitly referenced, publication of proprietary manufacturing and composite materials data constitutes significant business data exposure.The 0Mega ransomware group claims to have attacked US Liner Company & American Made LLC, with the disclosure status indicating data has been published. The leak post references industrial engineering and manufacturing data, suggesting exfiltration of business and operational information.
Data the group says was taken
AI dossier — extracted from the leak post- Industrial engineering documents
- Manufacturing process data
- Advanced materials specifications
- Thermoplastic composite solution records
- Business operational data
What the group claims
Industrial engineering, manufacturing, advanced materials, thermoplastic composite solutions
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
