Ransomware victim disclosure
← All victimsMD LOGISTICS
Claimed by Moneymessage · listed 3 years ago
Status timeline
- Listed
Oct 3, 2023
- Data leaked
At a glance
- Group
- Moneymessage
- Status
- Data leaked
- Country
- United States
- Listed on leak site
- Oct 3, 2023
About the victim
AI dossier — public-source company profileMD Logistics is a US-based third-party logistics (3PL) provider operating across the Midwest (Indianapolis), East Coast, and West Coast (Reno, NV). The company specializes in cold chain logistics and operates a Foreign Trade Zone (FTZ). They serve clients requiring temperature-controlled warehousing and distribution as well as international trade logistics.
- Industry
- Third-Party Logistics (3PL) & Cold Chain
- Address
- Indianapolis, IN and Reno, NV, United States
Attack summary
Severity: high — Data has been confirmed as published by the group ('data_published' status), indicating exfiltration of business data from a logistics provider that likely holds supply chain, client, and potentially regulated trade/customs data. While no detailed inventory is available, a 3PL/FTZ operator handles sensitive commercial and potentially regulated import/export documentation.The Moneymessage ransomware group claims an attack on MD Logistics, with the disclosure status recorded as data_published, indicating that data has been exfiltrated and published. No specific data size or ransom amount was stated in the captured post.
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
