Ransomware victim disclosure
← All victimsFSB Group Ltd.
listed as fsbgroup.ca · Claimed by Braincipher · listed 7 months ago
Status timeline
- Listed
Oct 29, 2025
- Data leaked
At a glance
- Group
- Braincipher
- Status
- Data leaked
- Country
- Canada
- Sector
- Financial Services
- Listed on leak site
- Oct 29, 2025
About the victim
AI dossier — public-source company profileFSB Group Ltd. is a Canadian insurance brokerage based in Ontario (phone area code 905), offering a comprehensive range of commercial and personal insurance products. Their commercial lines include realty, contractors, manufacturing, trucking/transportation, and cyber insurance, while personal lines cover auto, home, condominium, and high-net-worth coverage. They act as an intermediary working with leading Canadian insurers to tailor coverage for both businesses and individuals.
- Industry
- Insurance Brokerage
Attack summary
Severity: critical — Over 1 TB of data has been fully published by the threat actor. As an insurance broker, FSB Group Ltd. holds regulated PII, financial records, and sensitive commercial data for a large number of individual and business clients, representing a critical-scale regulated data breach.Braincipher claims to have exfiltrated more than 1 TB of data from FSB Group Ltd. and has published multiple onion-hosted download links, indicating the full dataset has been released publicly.
Data the group says was taken
AI dossier — extracted from the leak post- Client insurance records
- Personal identification information (PII)
- Commercial business data
- Financial and policy documents
- Employee records
- Internal business files
The group's post references roughly 10 proof files.
Original description
AI-summarised, not from the leak postN/A
The leak post
captured from the group's siteWe have more 1TB of data. If you think you are here by mistake, please contact us at [email protected] ⏳ 11d 22h 39m 6s remaining Download: 3fg2gfwrdks46drwvejpgpak5klrflclsjjo35dxtqfk3poeez6oezad.onion If you think you are here by mistake, please contact us at [email protected] Download: emdnfl2fv32jhssxcbxlo6dzg2at4d7qbw2md6inz63qzdfgyln5cwyd.onion If you think you are here by mistake, please contact us at [email protected] Download: a4vbe7yp4kluped6khuhpr5nmzshiimx2jt5j22ozriiq6ngsm3fcpyd.onion If you think you are here by mistake, please contact us at [email protected] Download: x3nb7qcygpem2j5xzstyzdtgzofzkwkx4eko3ug4r73i6uhcgvyffjyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 3frnhzcnlkjnw5q3tm6elzizinm2k3bmrtf2xwqjzpcxzeqwn2tv6wyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 6ft2dfh26wm3w44orpjcgviutvfp25ez2iyh5ego5egvfmifrws7vvqd.onion If you think you are here by mistake, please contact us at [email protected] Download: zijgmuqjzb6dc7pofxhtaiz36qqyg35lhutybmzaz6whzgei2casjgid.onion If you think…
Sources
Source
Indexed 7 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
