Ransomware victim disclosure
← All victimsMopec
Claimed by Dragonforce · listed 13 days ago
Status timeline
- Listed
May 7, 2026
Current state: Listed for ransom
At a glance
- Group
- Dragonforce
- Status
- Listed for ransom
- Country
- United States
- Sector
- Medical Equipment
- Listed on leak site
- May 7, 2026
- Data size
- 87710466048
- Ransom demanded
- $4
About the victim
AI dossier — public-source company profileMopec is a U.S.-based manufacturer and supplier of American-made pathology, histology, forensic, and mortuary equipment and consumables, headquartered in Madison Heights, Michigan. Their product lines include grossing stations, autopsy tables, cadaver storage, morgue refrigeration, microtomes, and a wide range of laboratory instruments and supplies. They serve hospital pathology labs, forensic facilities, anatomy labs, and mortuaries.
- Industry
- Pathology & Mortuary Equipment Manufacturing
- Address
- 800 Tech Row, Madison Heights, Michigan 48071, United States
Attack summary
Severity: high — Approximately 87.7 GB of data is claimed exfiltrated from a medical equipment manufacturer; the sector involves healthcare-adjacent operations and potential exposure of business, client, and operational data at significant scale. No confirmed PII or regulated health records explicitly listed, preventing 'critical' classification.Dragonforce claims to have exfiltrated approximately 87.7 GB of data from Mopec and has listed the company on their leak site. The group is demanding a ransom of $4 (unit likely unstated/placeholder) and has set a disclosure timer.
Data the group says was taken
AI dossier — extracted from the leak post- Company business data
- Internal files (87.7 GB exfiltrated)
What the group claims
Mopec supplies American-made medical equipment and laboratory products for pathological, histological, autopsy, and morgue services.
The leak post
captured from the group's site```
{"data":{"count":481,"publications":[{"uuid":"282416b0-8ad9-4980-a147-7bc506476190","created_at":"2026-05-04T10:59:12.451753Z","name":"Cult Wines","website":"cultwines.com","address":"www.cultwines.com","description":"Cult Wines is revolutionizing the fine wine industry by leveraging expertise, digital platforms, and innovative technology to enhance the buying, selling, investing, and collecting experience for producers and consumers. Their services support the entire life cycle of fine wine, ensuring transparency and secure transactions. Recognizing fine wine as a unique investment, Cult Wine Investment provides clients with a wealth of possibilities, combining heritage with cutting-edge technology to enrich portfolios and enhance lives. Targeting both new generations of wine drinkers and seasoned collectors, Cult Wines aims to build a global community around fine wine appreciation.","weight":308509929472,"is_timer_publication_stopped":false,"timer_publication":"2026-05-09T07:48:00Z","try_again":false,"tags":[],"logo_uuid":"4a447086-5796-40e1-9a66-a4a2900e7d62","is_transfering":false},{"uuid":"46716f4a-c0e6-42b4-abba-bb9025de4ef7","created_at":"2026-04-27T16:20:14.224783Z","na…Sources
Source
Indexed 13 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
