Ransomware victim disclosure
← All victimsParle Agro
Claimed by lamashtu · listed 4 days ago
Status timeline
- Listed
May 16, 2026
- Data leaked
At a glance
About the victim
AI dossier — public-source company profileParle Agro Private Limited is the largest Indian beverage company, headquartered in Mumbai, India, and operating since 1985. The company manufactures and markets non-alcoholic beverages and packaged foods under iconic brands including Frooti, Appy, Appy Fizz, B Fizz, Bailley, Bailley Soda, Smoodh, Bombay 99, and Hippo. With over 5,500 employees, it has a significant national and international business presence, including preforms manufacturing and export operations.
- Industry
- Non-Alcoholic Beverages & Packaged Foods
- Address
- Parle Agro Private Limited, off Western Express Highway, Sahar-Chakala Road, Parsiwada, Andheri (E), Mumbai 400 099, India
- Employees
- 5500
- Founded
- 1985
Attack summary
Severity: high — Data has been published (data_published status) by the threat actor against a large Indian FMCG company with 5,500+ employees, indicating confirmed exfiltration of significant business data at scale; however, the specific nature of the data is not detailed, precluding a 'critical' rating.The ransomware group Lamashtu claims to have attacked Parle Agro and has published data (disclosed status: data_published), though the leak post does not specify whether encryption, exfiltration, or both occurred, nor does it detail the volume or specific categories of data at stake.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate data
- Employee records
- Business operations data
- Brand and product information
What the group claims
Parle Agro — an Indian company that makes non‑alcoholic beverages and packaged foods (brands: Frooti, Appy/Appy Fizz, Bailley, Hippo).
Sources
Source
Indexed 4 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
