Ransomware victim disclosure
← All victimswestonconsulting.com
Claimed by BrainCipher · listed 20 days ago
Status timeline
- Listed
May 1, 2026
- Data leaked
At a glance
- Group
- BrainCipher
- Status
- Data leaked
- Country
- US
- Sector
- Business Services
- Listed on leak site
- May 1, 2026
About the victim
AI dossier — public-source company profileWeston Consulting is one of Canada's largest and most experienced planning and urban design firms, founded in 1981. The firm provides services spanning master planning, urban design, land development strategy, and government policy navigation for municipal, regional, and rural clients. It operates across projects of varying scales serving both public and private sector interests.
- Industry
- Planning & Urban Design Consulting
- Founded
- 1981
Attack summary
Severity: high — Over 1 TB of data has been confirmed exfiltrated and published across multiple onion download links, representing significant exposure of business and potentially client-sensitive data. While the sector is not directly regulated (e.g. healthcare/finance), the scale of exfiltration and full publication elevates this to high severity.BrainCipher claims to have exfiltrated more than 1 TB of data from Weston Consulting and has published download links to the stolen data across ten onion addresses, indicating full data publication with no ransom amount stated.
Data the group says was taken
AI dossier — extracted from the leak post- Exfiltrated company data (>1 TB)
- Project files (likely planning/urban design documents)
- Client records
- Internal business documents
The group's post references roughly 10 proof files.
Original description
AI-summarised, not from the leak postN/A
The leak post
captured from the group's siteWe have more 1TB of data. If you think you are here by mistake, please contact us at [email protected] ⏳ 12d 8h 29m 41s remaining Download: 3fg2gfwrdks46drwvejpgpak5klrflclsjjo35dxtqfk3poeez6oezad.onion If you think you are here by mistake, please contact us at [email protected] Download: emdnfl2fv32jhssxcbxlo6dzg2at4d7qbw2md6inz63qzdfgyln5cwyd.onion If you think you are here by mistake, please contact us at [email protected] Download: a4vbe7yp4kluped6khuhpr5nmzshiimx2jt5j22ozriiq6ngsm3fcpyd.onion If you think you are here by mistake, please contact us at [email protected] Download: x3nb7qcygpem2j5xzstyzdtgzofzkwkx4eko3ug4r73i6uhcgvyffjyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 3frnhzcnlkjnw5q3tm6elzizinm2k3bmrtf2xwqjzpcxzeqwn2tv6wyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 6ft2dfh26wm3w44orpjcgviutvfp25ez2iyh5ego5egvfmifrws7vvqd.onion If you think you are here by mistake, please contact us at [email protected] Download: zijgmuqjzb6dc7pofxhtaiz36qqyg35lhutybmzaz6whzgei2casjgid.onion If you think…
Sources
Source
Indexed 20 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
