In the latest cybersecurity news, Apex Logistics International — a company operating in the US — has fallen victim to a ransomware attack conducted by the group sarcoma. This data breach, discovered on 2025-04-05 08:45:43.121959, underscores the increasing need for proactive cybersecurity defenses as we continue through 2025.
To protect your business from future attacks, HookPhish offers solutions like:
Use our free Data Breach Checker to find out if your business data has been exposed.
Incident Report
Attribute | Information |
---|---|
Target Organization | Apex Logistics International |
Threat Group | sarcoma |
Summary | Apex Logistics International Deeply committed to the international transportation industry for over 20 years, Apex has gained rich experience in various verticals, providing customers with comprehensive, first-class and efficient logistics services around the globe. Apex Group has 46 self-operated offices across six continents, with over 2500 employees, providing high-quality, and efficient international logistics services to global customers. As a comprehensive logistics service provider founded in 2001, Apex has expanded its footprint across the Americas, Asia, Europe, and Oceania, and ranked No.2 airfreight forwarder in China 2023. Apex is a world class full-service global logistics and supply chain solutions provider with up to 4,000 charters annually and 370,000 TEUs global shipping container volume in 2023. Additionally, Apex Group also offers cross-border railway transportation covering the Eurasian continent, which provides customers with diversified and full-segment logistics solutions.Geo: Singapore (office) – Leak size: 62 GB Archive – Contains: Files |
Date of Breach | 2025-04-05 08:45:41.732325 |
Discovery Date | 2025-04-05 08:45:43.121959 |
Region | US |
Target Domain | None |
Business Sector | Transportation/Logistics |
Disclaimer: HookPhish does not engage in the exfiltration, downloading, taking, hosting, viewing, reposting, or disclosure of any stolen information. All breach data reported here is sourced from publicly available threat intelligence feeds for awareness purposes only.