Ransomware victim disclosure
← All victimsK.M. Packaging
Claimed by direwolf · listed 6 months ago
Status timeline
- Listed
Nov 26, 2025
- Data leaked
At a glance
- Group
- direwolf
- Status
- Data leaked
- Country
- TH
- Sector
- Manufacturing
- Listed on leak site
- Nov 26, 2025
About the victim
AI dossier — public-source company profileK.M. Packaging PCL (KMP) is a Thai publicly listed manufacturer and distributor of paper-based food and beverage packaging, including paper cups, ice cream cups, food boxes, microwave-safe containers, and biodegradable packaging. Founded in 1984 and headquartered in Samut Prakan, Thailand, the company has invested over 300 million baht in its 'Greenergy Factory' production facility, claiming top production capacity in ASEAN. KMP also holds proprietary innovations such as its 100% plastic-free 'No Plaz' paper coating technology.
- Industry
- Paper & Biodegradable Food Packaging Manufacturing
- Address
- Factory: 99/99 Moo 11, Bang Sao Thong Sub-district, Bang Sao Thong District, Samut Prakan 10570, Thailand; Sales Office: 91/18 Moo 15, Bang Kaeo Sub-district, Bang Phli District, Samut Prakan 10540, Thailand
- Founded
- 1984
Attack summary
Severity: medium — Data has been published by the threat actor, indicating confirmed exfiltration, but no details on the nature, volume, or sensitivity of the data are provided, and the victim is a manufacturing firm with no indication of regulated/sensitive data categories (e.g. medical, government, large-scale PII) at stake.The direwolf ransomware group claims an attack on K.M. Packaging and has published data (disclosed status: data_published), though the leak post itself provides no specific detail on whether encryption, exfiltration, or both occurred, and no ransom amount or data size has been stated.
Data the group says was taken
AI dossier — extracted from the leak post- Unspecified company data
What the group claims
Manufacturing
Sources
Source
Indexed 6 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
