Ransomware victim disclosure
← All victimsCitizens' Committee for Children of New York
Claimed by brotherhood · listed 7 months ago
Status timeline
- Listed
Oct 11, 2025
- Data leaked
At a glance
- Group
- brotherhood
- Status
- Data leaked
- Country
- United States
- Sector
- Public Sector
- Listed on leak site
- Oct 11, 2025
- Data size
- 45 GB
About the victim
AI dossier — public-source company profileCitizens' Committee for Children of New York (CCC New York) is a nonprofit advocacy organization based in New York City that has operated for over 80 years. The organization conducts research and data analysis on child and family well-being, engages in policy advocacy at the city, state, and federal levels, and mobilizes civic engagement to address systemic inequities affecting New York City's children and families. Its work spans issues including health, housing, education, child care, and economic security.
- Industry
- Child & Family Advocacy / Nonprofit Policy Research
- Address
- New York, NY, United States
- Employees
- 11-50
- Founded
- 1944
Attack summary
Severity: high — 45 GB of data has been published from a nonprofit that handles research on vulnerable populations including children and families, likely containing PII of program participants, community members, staff, and potentially minors — a sensitive population. The 'data_published' status confirms exfiltration and public exposure of significant organizational data.The ransomware group 'brotherhood' claims to have exfiltrated 45 GB of compressed files from Citizens' Committee for Children of New York, with the data now published as a disclosed leak. No ransom amount was stated and no additional detail about encryption or data categories was provided in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Compressed organizational files (45 GB)
What the group claims
Contains: 45 Gb compressed Files
Sources
- Victim sitewww.cccnewyork.org
Source
Indexed 7 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
