Ransomware victim disclosure
← All victimsThe Country Club of Darien
Claimed by nightspire · listed 20 days ago
Status timeline
- Listed
May 1, 2026
- Data leaked
At a glance
- Group
- nightspire
- Status
- Data leaked
- Country
- US
- Sector
- Hospitality and Tourism
- Listed on leak site
- May 1, 2026
About the victim
AI dossier — public-source company profileThe Country Club of Darien is a private members club located in Darien, Connecticut, USA. It provides golf, dining, social, and recreational amenities to its members and their guests. As a private club it serves a predominantly affluent local membership base in Fairfield County.
- Industry
- Private Members Club & Hospitality
- Address
- 300 Mansfield Avenue, Darien, CT 06820
- Employees
- 51-200
Attack summary
Severity: high — Data has been confirmed published (disclosed status: data_published), meaning exfiltration is not merely claimed but enacted. The data inventory includes business administration and commercial operations records which likely contain member PII, financial, and contact information for an affluent private membership base, constituting significant sensitive data exposure.Nightspire claims to have exfiltrated business data from The Country Club of Darien and has published the data, with disclosed categories spanning commercial operations, business administration, software and digital assets, and branding materials.
Data the group says was taken
AI dossier — extracted from the leak post- Sales / agent / commercial operations data
- Industrial / manufacturing / tooling business data
- Research & development / technical project data
- Business admin / office operations data
- Software / digital assets / branding materials
What the group claims
- Sales / agent / commercial operations- Industrial / manufacturing / tooling business data- Research & development / technical project data- Business admin / office operations- Software / digital assets / branding
Source
Indexed 20 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
