[PLAY] – Ransomware Victim: Nelligan White Architects
![[PLAY] - Ransomware Victim: Nelligan White Architects 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the PLAY Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On October 25, 2025, a ransomware leak post publicly identifies Nelligan White Architects, a United States-based architecture and design firm headquartered in New York City, as a victim. The post places the firm in the Construction industry and describes its specialization in sustainable design for schools and public buildings. The leak entry includes a claim URL and preserves the victim’s name, but the excerpt does not disclose a ransom amount or confirm whether data was encrypted or merely leaked, leaving the exact impact unspecified in the available text. The post has 122 views according to the accompanying metadata, and the firm’s website is referenced in defanged form: www[.]nelliganwhite[.]com.
The leak page provides no visible images or internal documents (there are zero screenshots or attachments shown in the excerpt). No compromise date is stated beyond the post date; the post date is October 25, 2025, and the metadata indicates the page was added on October 21, 2025. The data volume is not disclosed (size_gb unknown), and there is no stated ransom figure. The content remains neutral and primarily identifies the victim and its professional focus rather than detailing specific files. The presence of a claim URL suggests a path for verification or negotiation, but the available text does not include details on data types, exfiltration scope, or any ransom demand.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.