Ransomware victim disclosure
← All victimsCanada Goose - with
Claimed by coinbasecartel · listed 1 month ago
Status timeline
- Listed
Apr 15, 2026
- Data leaked
At a glance
- Group
- coinbasecartel
- Status
- Data leaked
- Country
- CA
- Sector
- Consumer Services
- Listed on leak site
- Apr 15, 2026
About the victim
AI dossier — public-source company profileCanada Goose is a Canadian luxury apparel company headquartered in Toronto, Ontario, founded in 1957. The company specializes in the design, manufacture, and sale of premium cold-weather outerwear including parkas, jackets, vests, and accessories. It operates globally through owned retail stores, e-commerce channels, and wholesale partnerships across North America, Europe, and Asia.
- Industry
- Luxury Outerwear & Apparel
- Address
- 100 Queens Quay East, Toronto, Ontario, M5E 1V3, Canada
- Employees
- 3000-5000
- Founded
- 1957
Attack summary
Severity: medium — Data is marked as published, indicating confirmed exfiltration, but no specifics on the volume, type, or sensitivity of data are provided in the post. Without evidence of regulated PII at scale, medical, or financial data, severity cannot be elevated to critical or high.The coinbasecartel ransomware group claims an attack on Canada Goose with a disclosed status of data_published, suggesting data has been exfiltrated and published. No specific ransom demand, data size, or detailed description of stolen data types was provided in the leak post.
Original description
AI-summarised, not from the leak postCanada Goose is a Canadian luxury apparel company founded in 1957 and headquartered in Toronto, Ontario. It specializes in the design, manufacture, and sale of premium outerwear, including parkas, jackets, vests, and accessories. Known for extreme cold-weather performance, the brand operates globally through retail stores, e-commerce, and wholesale partnerships across North America, Europe, and Asia.
The leak post
captured from the group's siteSystem Breach • Coinbasecartel We are looking for new partners/insiders. Send us a message to dicuss We are looking for new partners/insiders. Send us a message to dicuss CRITICAL ANNOUNCEMENTS × Contact Update We have changed our contact method. We now exclusively use qTox Messenger for all communications. SimpleX and Session have been discontinued. Our Tox ID: A7580331D4D16453CCE86D7ADFBCF0CEED0D0D1AEA8F4DBEEBCA9E3B46308F260DE9B41BD838 TO APTIM You may have noticed the sudden, heavy silence. The corporate VPNs are dead. We have been the silent architects of your network for the past three weeks. While your "elite" investigators from Mandiant sat in your logs, we sat directly beside them burning through over a hundred of your corporate identities like disposable tools. we have had your entire network and internal protocols. HOW LONG WILL YOU KEEP YOUR THOUSANDS OF FIELD WORKERS LOCKED OUT? We have successfully exfiltrated the most sensitive engineering data held by any firm in your sectors We hold the complete Navisworks 3D models, P&ID diagrams, and maintenance logic for your major energy plants. This includes the granular Honeywell DCS controller logic. We know…
Sources
Source
Indexed 1 month agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
