Ransomware victim disclosure
← All victimsUSB Memory Direct
listed as usbmemorydirect.com · Claimed by Stormous · listed 7 months ago
Status timeline
- Listed
Oct 27, 2025
- Data leaked
At a glance
- Group
- Stormous
- Status
- Data leaked
- Country
- United States
- Sector
- Technology
- Listed on leak site
- Oct 27, 2025
About the victim
AI dossier — public-source company profileUSB Memory Direct (usbmemorydirect.com) is a US-based company specializing in custom-branded USB flash drives, power banks, and related promotional products. They offer over seventy customizable drive styles with logo printing, data loading services, and rush shipping options. Their primary market is businesses seeking branded promotional merchandise for trade shows, corporate gifts, and giveaways.
- Industry
- Promotional USB Flash Drives & Custom Branded Storage
Attack summary
Severity: high — Data has been published (not merely threatened), and the exfiltrated set includes personal PII (names, photos) alongside business-sensitive internal documents, backups, and project files, representing confirmed exfiltration of mixed personal and business data at meaningful scale.The Stormous ransomware group claims to have exfiltrated data from USB Memory Direct, including personal data (individual names and photos), company and business data, backup copies, system archive files, and internal documents and project files. The disclosure status is listed as data_published, indicating the stolen data has been released.
Data the group says was taken
AI dossier — extracted from the leak post- Personal names
- Personal photos
- Company/business data
- Service and equipment records
- Backup copies
- System archive compressed files
- Internal documents
- Project files
What the group claims
Personal data (individual names, photos, etc.), company/business data (company names, services, tools, equipment), backup copies, system archive compressed files, internal documents and project files, and more.
Sources
- Victim siteusbmemorydirect.com
Source
Indexed 7 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
