Ransomware victim disclosure
← All victimsPromotion Management Center
Claimed by AiLock · listed 3 months ago
Status timeline
- Listed
Mar 3, 2026
- Data leaked
At a glance
- Group
- AiLock
- Status
- Data leaked
- Country
- Japan
- Sector
- Business Services
- Listed on leak site
- Mar 3, 2026
About the victim
AI dossier — public-source company profilePromotion Management Center, Inc. (PMC), founded in 1983, provides fulfillment services specializing in customer incentives, loyalty rewards, employee recognition awards, rebates, and third-party logistics (3PL). The company operates under the domain pmci.com and serves clients running promotional and incentive programs. It is categorized under business services and appears to be US-based despite the Japan country tag in this record.
- Industry
- Promotion Fulfillment & Loyalty Program Services
- Founded
- 1983
Attack summary
Severity: high — Data has been published (data_published status), meaning exfiltrated data has been released. PMC handles customer PII across incentive, loyalty, and rebate programs at potentially significant scale, constituting meaningful exposure of business and consumer data.The AiLock ransomware group claims to have attacked Promotion Management Center, Inc. and has published data (disclosed status: data_published), though no specific data volume or ransom amount has been stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Customer incentive program data
- Loyalty rewards records
- Employee recognition award data
- Rebate processing records
- Third-party logistics order data
- Business operational files
What the group claims
Founded in 1983, Promotion Management Center, Inc. (PMC) provides fulfillment services.The company specializes in customer incentives, loyalty rewards, employee recognition awards, rebates and third party logistics (3PL) orders your programs generate.
Sources
- Victim sitepmci.com
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
