Ransomware victim disclosure
← All victimsLivingston International
listed as Livingston · Claimed by Avoslocker · listed 3 years ago
Status timeline
- Listed
Dec 26, 2022
- Data leaked
At a glance
- Group
- Avoslocker
- Status
- Data leaked
- Country
- Canada
- Sector
- Technology
- Listed on leak site
- Dec 26, 2022
About the victim
AI dossier — public-source company profileLivingston International is a Canadian customs brokerage and trade services firm offering customs clearance, global trade management, freight forwarding, and compliance solutions. The company serves businesses of all sizes across Canada and internationally, with offices in multiple countries. Its technology-driven platform supports real-time shipment monitoring, border compliance, and duty optimization.
- Industry
- Customs Brokerage & Trade Logistics
- Employees
- 1001-5000
Attack summary
Severity: high — Livingston International handles sensitive cross-border trade data, customs declarations, and client business records at scale across Canada and internationally. Confirmed data publication by AvosLocker suggests actual exfiltration of significant business and potentially regulated trade data, warranting a high severity rating.AvosLocker claims to have attacked Livingston International and has published data (disclosed status: data_published), indicating exfiltration of company data. No specific ransom amount or data volume was stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Trade and customs documentation
- Client shipment records
- Compliance and regulatory files
- Business correspondence
- Employee records
What the group claims
Livingston is a quality source for rental of all Test Equipment and Equipment Management Services with local offices in all major countries.
Sources
- Victim sitelivingstonintl.com
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
