Ransomware victim disclosure
← All victimsWoodmen Valley Chapel
Claimed by brotherhood · listed 7 months ago
Status timeline
- Listed
Oct 10, 2025
- Data leaked
At a glance
- Group
- brotherhood
- Status
- Data leaked
- Country
- United States
- Sector
- Not Found
- Listed on leak site
- Oct 10, 2025
- Data size
- 274 GB
About the victim
AI dossier — public-source company profileWoodmen Valley Chapel is a non-denominational Christian church headquartered in Colorado Springs, Colorado, operating five campuses across the region (Rockrimmon, Heights, Monument, Downtown, and Ark Valley). The church offers weekend worship services, community groups, discipleship programs, youth and family ministries, and various outreach initiatives. It serves a large multi-campus congregation with services in English and Spanish.
- Industry
- Religious Organization / Non-Denominational Church
- Address
- 290 E Woodmen Rd, Colorado Springs, CO (primary/Rockrimmon Campus)
Attack summary
Severity: high — 274 GB of data has been published (disclosed status: data_published), indicating confirmed exfiltration of significant organizational data. A multi-campus church likely holds congregant PII (names, contact details, financial giving records, counseling/care records, potentially health-related ministry data), raising serious privacy concerns at scale even if not a regulated healthcare or financial entity.The ransomware group 'brotherhood' claims to have exfiltrated 274 GB of compressed files from Woodmen Valley Chapel and has published the data. No ransom amount was stated and no further detail on data categories was provided in the leak post.
Data the group says was taken
AI dossier — extracted from the leak post- 274 GB compressed files
What the group claims
Contains: 274 Gb compressed Files
Sources
Source
Indexed 7 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
