Ransomware victim disclosure
← All victimsNew Toyo International Holdings Ltd
Claimed by obscura · listed 7 months ago
Status timeline
- Listed
Nov 1, 2025
- Data leaked
At a glance
- Group
- obscura
- Status
- Data leaked
- Country
- SG
- Sector
- Manufacturing
- Listed on leak site
- Nov 1, 2025
- Data size
- 2 GB
- Ransom demanded
- $221.7K
- Estimated revenue
- $221.7
About the victim
AI dossier — public-source company profileNew Toyo International Holdings Ltd is a Singapore-listed holding company primarily engaged in the manufacture and sale of packaging materials, including printed cartons, paper-based packaging, and related products. The group operates manufacturing facilities across Southeast Asia, including Singapore, Malaysia, China, and Vietnam. It serves clients in the consumer goods, food and beverage, and tobacco industries.
- Industry
- Packaging & Paper Products Manufacturing
- Employees
- 201-500
- Founded
- 1967
Attack summary
Severity: high — Data has been published (disclosed status: data_published) and approximately 2 GB of exfiltrated corporate data is at stake from a publicly listed manufacturing conglomerate, representing significant business and potentially financial data exposure across multiple jurisdictions.The ransomware group Obscura claims to have exfiltrated approximately 2 GB of data from New Toyo International Holdings Ltd, with the disclosure status listed as 'data_published' and a countdown timer suggesting imminent or ongoing release. The post references a revenue figure of $221.7K as the ransom demand and indicates the stolen data is pending full publication.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate financial records
- Business operational data
- Internal company documents
What the group claims
Revenue: $221.7kk | Leak Size: 2 GB | Status: Pending | Time Left: 6d 17h 27m 32s
Sources
Source
Indexed 7 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
