Ransomware victim disclosure
← All victimsB&G Foods
Claimed by Daixin · listed 3 years ago
Status timeline
- Listed
Feb 11, 2023
- Data leaked
At a glance
- Group
- Daixin
- Status
- Data leaked
- Country
- United States
- Sector
- Food & Agriculture
- Listed on leak site
- Feb 11, 2023
About the victim
AI dossier — public-source company profileB&G Foods, Inc. is a publicly traded manufacturer, seller, and distributor of shelf-stable and frozen foods and household products, operating primarily in the United States, Canada, and Puerto Rico. The company manages a portfolio of more than 50 consumer brands spanning categories including baking, condiments, snacks, sauces, seasonings, and vegetables. B&G Foods is headquartered in Parsippany, New Jersey and is listed on the New York Stock Exchange (BGS).
- Industry
- Packaged & Shelf-Stable Food Manufacturing
- Employees
- 1001-5000
- Founded
- 1822
Attack summary
Severity: high — Data has been published by the threat actor against a publicly traded food manufacturer, confirming exfiltration of significant business data. The company's scale (50+ brands, NYSE-listed) and the confirmed data publication elevate this beyond medium, though the absence of stated regulated/PII data at scale or critical infrastructure disruption stops it short of critical.The Daixin ransomware group claims to have compromised B&G Foods and has published data (disclosed status: data_published), indicating exfiltration of company data; no ransom amount or specific data volume was stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate business data
- Potentially employee records
- Potentially financial records
- Potentially supplier/vendor information
What the group claims
B&G Foods, Inc. manufactures, sells, and distributes a portfolio of shelf-stable and frozen foods, and household products in the United States, Canada, and Puerto Rico.
Sources
- Victim sitebgfoods.com
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
