Ransomware victim disclosure
← All victimseworldme.com
Claimed by BrainCipher · listed 20 days ago
Status timeline
- Listed
May 1, 2026
- Data leaked
At a glance
- Group
- BrainCipher
- Status
- Data leaked
- Country
- AE
- Sector
- Not Found
- Listed on leak site
- May 1, 2026
About the victim
AI dossier — public-source company profileEasy World Automation (eworldme.com) is a Middle East-based distributor of industrial data communication, automation, computing, and networking products, serving sectors including oil & gas, power utility, railway, marine, and water & wastewater. The company operates offices in Dubai (UAE), Muscat (Oman), Al Khobar, and Riyadh (Saudi Arabia). It partners with major vendors such as MOXA, Siemens, Westermo, Beijer, and others, offering presales support, network design, installation, and training services.
- Industry
- Industrial Data Communication & Automation Products Distribution
- Address
- Office 204, Building no.1, Emaar Business Park, Sheikh Zayed Road, P.O. Box 29505, Dubai, UAE
Attack summary
Severity: high — Over 1 TB of data has been exfiltrated and published across 10 separate onion download links, indicating confirmed large-scale data disclosure. The company serves critical infrastructure sectors (oil & gas, power utility, railway), elevating potential impact, though the specific data types (PII, financial, regulated) are not confirmed in the post.BrainCipher claims to have exfiltrated more than 1 TB of data from Easy World Automation and has published multiple onion-link download URLs indicating the data has been fully released. No ransom amount was stated.
Data the group says was taken
AI dossier — extracted from the leak post- Exfiltrated corporate data (>1 TB, contents unspecified)
- Potentially business/operational files
- Potentially partner and customer records
The group's post references roughly 10 proof files.
Original description
AI-summarised, not from the leak postN/A
The leak post
captured from the group's siteWe have more 1TB of data. If you think you are here by mistake, please contact us at [email protected] ⏳ 12d 8h 29m 41s remaining Download: 3fg2gfwrdks46drwvejpgpak5klrflclsjjo35dxtqfk3poeez6oezad.onion If you think you are here by mistake, please contact us at [email protected] Download: emdnfl2fv32jhssxcbxlo6dzg2at4d7qbw2md6inz63qzdfgyln5cwyd.onion If you think you are here by mistake, please contact us at [email protected] Download: a4vbe7yp4kluped6khuhpr5nmzshiimx2jt5j22ozriiq6ngsm3fcpyd.onion If you think you are here by mistake, please contact us at [email protected] Download: x3nb7qcygpem2j5xzstyzdtgzofzkwkx4eko3ug4r73i6uhcgvyffjyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 3frnhzcnlkjnw5q3tm6elzizinm2k3bmrtf2xwqjzpcxzeqwn2tv6wyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 6ft2dfh26wm3w44orpjcgviutvfp25ez2iyh5ego5egvfmifrws7vvqd.onion If you think you are here by mistake, please contact us at [email protected] Download: zijgmuqjzb6dc7pofxhtaiz36qqyg35lhutybmzaz6whzgei2casjgid.onion If you think…
Sources
Source
Indexed 20 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
