Ransomware victim disclosure
← All victimsMid-American Glass
listed as midamericanglass.com · Claimed by Moneymessage · listed 3 years ago
Status timeline
- Listed
Apr 3, 2023
- Data leaked
At a glance
- Group
- Moneymessage
- Status
- Data leaked
- Country
- United States
- Sector
- Manufacturing
- Listed on leak site
- Apr 3, 2023
- Ransom demanded
- $11.4M
- Estimated revenue
- $11.4M
About the victim
AI dossier — public-source company profileMid-American Glass is a regional distributor and fabricator of flat glass, insulating glass, and architectural metal products. The company is based in the United States and serves architectural and construction markets. Flat glass distribution is its core business, complemented by growing insulating glass and architectural metal fabrication operations.
- Industry
- Flat Glass Distribution & Architectural Glass Fabrication
Attack summary
Severity: high — Data has been confirmed published (disclosed status: data_published), indicating successful exfiltration and public release of company data by the threat actor, representing significant business data exposure even without explicit enumeration of data types.The Moneymessage ransomware group claims to have published data belonging to Mid-American Glass, with the disclosed status indicating data has been fully published. The post references the company's reported revenue of $11.4M, which appears to have been used as the ransom demand figure.
Data the group says was taken
AI dossier — extracted from the leak post- Company financial data
- Business records
What the group claims
Mid-American Glass is a regional distributor / fabricator of flat glass, insulating glass, and architectural metal. While flat glass distribution remains the strength of our company, our fabrication of insulating glass and architectural metal continues to drive our growth.Website www.midamericanglass.comRevenue $11.4M
Sources
- Victim sitemidamericanglass.com
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
