Ransomware victim disclosure
← All victimsflbgroup.com
Claimed by BrainCipher · listed 20 days ago
Status timeline
- Listed
May 1, 2026
- Data leaked
At a glance
- Group
- BrainCipher
- Status
- Data leaked
- Country
- GB
- Sector
- Business Services
- Listed on leak site
- May 1, 2026
About the victim
AI dossier — public-source company profileFLB Group Ltd is a UK-based corporate holding company that owns and operates the Filofax, Letts, and Blueline stationery and organiser brands. The group maintains owned subsidiaries in the US, Germany, France, Italy, and Scandinavia, with manufacturing offices in Hong Kong and over 30 international distributors. It serves as the parent entity for three well-known consumer stationery brands sold globally.
- Industry
- Stationery, Organiser & Branded Consumer Goods
- Employees
- 51-200
Attack summary
Severity: high — Over 1 TB of data has been confirmed exfiltrated and published across 10 onion download links, representing a significant confirmed data breach of a multi-national consumer goods group including potential employee, financial, and commercial partner data.BrainCipher claims to have exfiltrated more than 1 TB of data from FLB Group and has published multiple onion download links indicating the data has been fully released. No encryption claim is explicitly stated; the disclosure status is confirmed data publication.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate business data (>1 TB)
- Subsidiary operational records
- Potentially employee/HR records
- Potentially financial/commercial records
- Potentially distributor/partner information
The group's post references roughly 10 proof files.
Original description
AI-summarised, not from the leak postN/A
The leak post
captured from the group's siteWe have more 1TB of data. If you think you are here by mistake, please contact us at [email protected] ⏳ 12d 8h 29m 41s remaining Download: 3fg2gfwrdks46drwvejpgpak5klrflclsjjo35dxtqfk3poeez6oezad.onion If you think you are here by mistake, please contact us at [email protected] Download: emdnfl2fv32jhssxcbxlo6dzg2at4d7qbw2md6inz63qzdfgyln5cwyd.onion If you think you are here by mistake, please contact us at [email protected] Download: a4vbe7yp4kluped6khuhpr5nmzshiimx2jt5j22ozriiq6ngsm3fcpyd.onion If you think you are here by mistake, please contact us at [email protected] Download: x3nb7qcygpem2j5xzstyzdtgzofzkwkx4eko3ug4r73i6uhcgvyffjyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 3frnhzcnlkjnw5q3tm6elzizinm2k3bmrtf2xwqjzpcxzeqwn2tv6wyd.onion If you think you are here by mistake, please contact us at [email protected] Download: 6ft2dfh26wm3w44orpjcgviutvfp25ez2iyh5ego5egvfmifrws7vvqd.onion If you think you are here by mistake, please contact us at [email protected] Download: zijgmuqjzb6dc7pofxhtaiz36qqyg35lhutybmzaz6whzgei2casjgid.onion If you think…
Sources
Source
Indexed 20 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
