Ransomware victim disclosure
← All victimsCrown Laboratories
Claimed by Abyss · listed 2 months ago
Status timeline
- Listed
Mar 28, 2026
- Data leaked
At a glance
- Group
- Abyss
- Status
- Data leaked
- Country
- United States
- Sector
- Pharmaceuticals
- Listed on leak site
- Mar 28, 2026
- Data size
- 8TB
- Ransom demanded
- $50
About the victim
AI dossier — public-source company profileCrown Laboratories, founded in 2000 and headquartered in Johnson City, Tennessee, develops and provides pharmaceutical, ethical OTC, and science-based skincare products to the medical marketplace, as well as contract manufacturing services to the pharmaceutical industry. The company operates a diverse portfolio spanning topical therapeutics, premium skincare, and medical devices across approximately 60 countries. Crown Laboratories has since merged with Revance Therapeutics to form Revance, a global aesthetics and skincare company.
- Industry
- Pharmaceutical & OTC Skincare Products / Contract Manufacturing
- Address
- Johnson City, TN, United States
- Founded
- 2000
Attack summary
Severity: critical — 8TB of data has been fully published by the group (data_published status, 15 data archives plus a filelist). The victim is a pharmaceutical and OTC/prescription products company, making it highly likely the exfiltrated data includes regulated information such as drug formulations, medical/prescription records, manufacturing data, and potentially patient or healthcare-provider PII — all qualifying as sensitive regulated data at significant scale.The Abyss ransomware group claims to have exfiltrated 8TB of uncompressed data from Crown Laboratories and has published the data across 15 multi-part RAR archive files on their dark-web leak site, along with a file listing archive, indicating full data publication rather than a mere listing.
Data the group says was taken
AI dossier — extracted from the leak post- Pharmaceutical product data
- Contract manufacturing records
- Corporate business files
- Potentially regulated OTC/prescription product documentation
- Internal company documents (inferred from 8TB volume)
The group's post references roughly 16 proof files.
What the group claims
Pharmaceutical and OTC product data, contract manufacturing information
The leak post
captured from the group's site```
let data = [
{
'title' : 'thinlinetech.com',
'short' : 'thinlinetech.com 29Gb uncompressed data',
'full' : 'Thinline Technologies <br>' +
'Thinline Technologies offers reliable IT consulting and expert computer and network support services to businesses in the Baltimore metro area.<br> They specialize in network administration, technology planning, and help desk services, focusing on increasing productivity and profitability for small to mid-size businesses.<br>'+
'password: 6oGfyIRISQmmI3Ge2kEeyu7hbzONONEFpkcnhC1S4Ygk4iSpw4RRxDXY1uk9xeyUXOmg7UOuZvGekRc9cs8E61LWKdI08uv0kUyC4V6YxaETtrhniAtKD9t7FQ2qTFYi<br>'+
'Link â„–1 Filelist',
'links' : [
"http://zngbsq66uwem4qzyxpqb5rjo2xebnbwdku27nhmquryx6ljnbbedhiad.onion/thinline.lst.zip",
"http://zngbsq66uwem4qzyxpqb5rjo2xebnbwdku27nhmquryx6ljnbbedhiad.onion/thinline.rar"
]
},
{
'title' : 'sitoy.com',
'short' : 'sitoy.com 1.7Tb uncompressed data',
'full' : 'Sitoy Group <br>' +
'Founded in 1968, Sitoy Group is engaged in the design, research, development, manufacturing, sale, wholesaling, and re…Data the group says was taken
- pharmaceutical_data
- manufacturing_data
- business_data
Screenshot of the leak post

Sources
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
