Ransomware victim disclosure
← All victimsACE Forwarding
Claimed by obscura · listed 5 months ago
Status timeline
- Listed
Dec 12, 2025
- Data leaked
At a glance
- Group
- obscura
- Status
- Data leaked
- Country
- United States
- Sector
- Transportation/Logistics
- Listed on leak site
- Dec 12, 2025
About the victim
AI dossier — public-source company profileACE Forwarding is a US-based global transport and logistics company founded in 1994, originally operating a single truck serving the Detroit airport. The company offers air freight, crating, expediting, international forwarding, intermodal transport, warehousing, and brokerage services, operating a fleet of over 30 company-owned vehicles and partnering with carriers worldwide.
- Industry
- Freight Forwarding & Logistics
- Employees
- 51-200
- Founded
- 1994
Attack summary
Severity: medium — Data is marked as published by the threat actor, indicating exfiltration has occurred, but no specific sensitive regulated data (e.g., PII at scale, medical, financial) has been described, no data volume is stated, and the leak post provides no substantive proof beyond mirroring the company's public website text.The ransomware group Obscura claims to have published data belonging to ACE Forwarding, with the disclosure status marked as data_published. The leak post content mirrors the company's public website description of its crating services, and no specific data volume or ransom demand has been stated.
Data the group says was taken
AI dossier — extracted from the leak post- Company operational data
- Freight and logistics records
- Customer shipment information
What the group claims
Ace Forwarding offers several methods of protecting your freight. Full-service crating and repackaging are available in a variety of materials. Our full time staff of carpenters will custom-tailor crating and packaging to fit your specific needs.
Sources
- Victim siteaceforwarding.com
Source
Indexed 5 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
