Ransomware victim disclosure
← All victimsMSX International
Claimed by Nokoyawa · listed 3 years ago
Status timeline
- Listed
May 23, 2023
- Data leaked
At a glance
- Group
- Nokoyawa
- Status
- Data leaked
- Country
- United States
- Sector
- Automotive
- Listed on leak site
- May 23, 2023
About the victim
AI dossier — public-source company profileMSX International (MSXI) is a global automotive services company that has operated for more than 25 years, partnering with leading automotive OEMs and dealers worldwide. The company provides services across Customer Experience, Repair Optimization, Learning, Sales Performance, and Parts & Accessories, leveraging technology, AI, and field teams. It maintains a presence across Europe, Asia-Pacific, North America, Latin America, and Africa.
- Industry
- Automotive Business Process Outsourcing & Consulting
- Employees
- 5000+
- Founded
- 1992
Attack summary
Severity: high — Data has been confirmed as published by the threat actor, indicating successful exfiltration from a large multinational company with extensive OEM and dealer client relationships, likely containing significant proprietary business and client data.The Nokoyawa ransomware group claims to have attacked MSX International and has published data, though no specific ransom amount or data size was stated in the post. The disclosure status indicates data has been published, suggesting exfiltration of company data.
Data the group says was taken
AI dossier — extracted from the leak post- Business operations data
- Customer engagement records
- Automotive partner/client data
- Internal company documents
What the group claims
For more than 25 years, MSX International has been a dedicated partner to leading automotive brands around the world. They support them in transforming their businesses and in managing their operations across the areas of Customer Experience, Repair Optimization, Learning and...
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
