Ransomware victim disclosure
← All victimsEeyou Communications Network
Claimed by AiLock · listed 2 months ago
Status timeline
- Listed
Mar 7, 2026
- Data leaked
At a glance
- Group
- AiLock
- Status
- Data leaked
- Country
- Canada
- Sector
- Telecommunication
- Listed on leak site
- Mar 7, 2026
About the victim
AI dossier — public-source company profileEeyou Communications Network is a regional fibre optic network operator serving the James Bay and Eeyou Istchee regions of Québec, Canada, operating since 2004. The organisation runs an Open Access Model designed to foster competition among internet service providers and address the Digital Divide affecting Indigenous and remote communities in the region. Its head office is located in Mistissini, Québec, with service and administrative offices in Chibougamau.
- Industry
- Regional Fibre Optic Telecommunications
- Address
- 187, Main Street, Mistissini, Québec, G0W 1C0
- Founded
- 2004
Attack summary
Severity: high — The victim is a telecommunications infrastructure provider serving remote Indigenous communities in Canada, and the disclosed status is data_published, indicating confirmed data exfiltration or release. Compromise of a regional ISP operator can affect essential connectivity services and potentially expose subscriber PII and operational network data, warranting a high severity rating despite the absence of explicit data inventory details.The AiLock ransomware group claims an attack against Eeyou Communications Network, with the disclosure status recorded as data_published, indicating that data has been released or made available. No specific details on encryption, exfiltration volume, or data categories were provided in the leak post.
What the group claims
Eeyou Communications Network operates a regional fibre optic network serving the James Bay and Eeyou Istchee regions, providing ultra-high-speed internet since 2004.
Sources
- Victim siteeeyou.ca
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
