Ransomware victim disclosure
← All victimsCentury Label (CMC Group)
listed as CMC Group · Claimed by Vicesociety · listed 3 years ago
Status timeline
- Listed
Apr 30, 2023
- Data leaked
At a glance
- Group
- Vicesociety
- Status
- Data leaked
- Country
- United States
- Sector
- Manufacturing
- Listed on leak site
- Apr 30, 2023
About the victim
AI dossier — public-source company profileCentury Label is a custom label and packaging printer headquartered in Bowling Green, Ohio, operating as a subsidiary of CMC Group. Founded in 1980, the company produces pressure sensitive labels, shrink sleeves, and flexible packaging for brand owners across markets including specialty food, beverage, nutraceutical, health & beauty, and industrial sectors. It operates onsite printing facilities with HD Flexo and digital equipment and serves clients globally.
- Industry
- Custom Label & Packaging Printing
- Address
- Bowling Green, Ohio, United States
- Founded
- 1980
Attack summary
Severity: high — Data has been confirmed as published by the ransomware group, indicating successful exfiltration and public release of company data. While the exact data categories are not fully enumerated, a manufacturing/printing company would likely hold customer PII, financial records, and proprietary business data, warranting a high severity classification.Vice Society claims to have attacked Century Label (a CMC Group company) and has published data from the breach. The disclosed status indicates data has been published, though the specific volume and categories of exfiltrated data are not detailed in the leak post.
Data the group says was taken
AI dossier — extracted from the leak post- Business/operational files
- Potentially customer records
- Potentially employee records
- Corporate documents
What the group claims
Located in Bowling Green, Ohio, Century Label (a CMC Group company) has over 40 years of experience printing custom labels and packaging.
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
