Ransomware victim disclosure
← All victimsnwlr.ca
Claimed by BrainCipher · listed 20 days ago
Status timeline
- Listed
May 1, 2026
- Data leaked
At a glance
- Group
- BrainCipher
- Status
- Data leaked
- Country
- CA
- Sector
- Technology
- Listed on leak site
- May 1, 2026
About the victim
AI dossier — public-source company profileNorthWind Land Resources Inc. is a Canadian environmental services company headquartered in Edmonton, Alberta. The company provides professional environmental site assessment and remediation, land reclamation, soil survey and classification, pipeline soil handling, oil sands reclamation, and wildlife management services. It also maintains an Indigenous Partnership and Training program and serves clients across the natural resources sector.
- Industry
- Environmental & Land Resources Consulting
- Address
- 2404 Ellwood Drive SW, Edmonton, AB T6X 0A9, Canada
Attack summary
Severity: high — Over 1 TB of data has been confirmed exfiltrated and publicly published across multiple Tor download links. The company handles sensitive environmental, land, and potentially Indigenous partnership data; the large volume and full publication constitute a significant business-data breach even without explicit PII categorisation.BrainCipher claims to have exfiltrated more than 1 TB of data from NorthWind Land Resources Inc. and has published download links via multiple Tor onion addresses, indicating the data has been fully released rather than held for ransom.
Data the group says was taken
AI dossier — extracted from the leak post- Exfiltrated company data (>1 TB, contents unspecified)
The group's post references roughly 10 proof files.
Original description
AI-summarised, not from the leak postN/A
The leak post
captured from the group's siteWe have more 1TB of data. If you think you are here by mistake, please contact us at [email protected] ⏳ 12d 8h 29m 41s remaining Download: 3fg2gfwrdks46drwvejpgpak5klrflclsjjo35dxtqfk3poeez6oezad.onion If you think you are here by mistake, please contact us at [email protected] Download: emdnfl2fv32jhssxcbxlo6dzg2at4d7qbw2md6inz63qzdfgyln5cwyd.onion If you think you are here by mistake, please contact us at [email protected] Download: a4vbe7yp4kluped6khuhpr5nmzshiimx2jt5j22ozriiq6ngsm3fcpyd.onion If you think you are here by mistake, please contact us at [email protected] Download: x3nb7qcygpem2j5xzstyzdtgzofzkwkx4eko3ug4r73i6uhcgvyffjyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 3frnhzcnlkjnw5q3tm6elzizinm2k3bmrtf2xwqjzpcxzeqwn2tv6wyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 6ft2dfh26wm3w44orpjcgviutvfp25ez2iyh5ego5egvfmifrws7vvqd.onion If you think you are here by mistake, please contact us at [email protected] Download: zijgmuqjzb6dc7pofxhtaiz36qqyg35lhutybmzaz6whzgei2casjgid.onion If you think…
Sources
Source
Indexed 20 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
