[SARCOMA] – Ransomware Victim: ldi-trucking-inc

image

Ransomware Group: SARCOMA

VICTIM NAME: ldi-trucking-inc

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the SARCOMA Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page associated with Lexmar Distribution, Inc. details a significant data breach within the transportation and logistics sector. Lexmar, known for its customer-focused approach in the trucking industry, has been subject to a data compromise that led to a leak of approximately 46 GB of internal files. The breach highlights the critical importance of cybersecurity measures in protecting sensitive business information, particularly in industries that rely heavily on customer data and operational efficiency. The leak suggests potential vulnerabilities within the company’s information systems that could have been exploited by malicious actors.

According to the information available, the leak was first discovered on February 11, 2025. Although specific details regarding the methods of the breach have not been disclosed, the significant size of the leaked data indicates the possibility of extensive internal documentation and contracts being compromised. This incident not only poses risks to Lexmar’s operational integrity but could also impact the trust and confidentiality customers expect from the company. The involvement of a group known as “sarcoma” further emphasizes the rising threat of coordinated cybercriminal activities targeting industry players in the United States.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.