As in the case of the earlier leaks, the material released this time appears to be mostly financial data.
Fisher & Paykel, a subsidiary of Chinese multinational home appliance maker Haier Group, is based in East Tamaki, New Zealand.
It operates in about 50 countries and has manufacturing operations in Thailand, China, Italy and Mexico, according to Wikipedia.
A screenshot of the Nefilim site on the dark web.
The data on the infected machines is then encrypted and a ransom note issued, with a deadline for payment.
If the victim does not enter into negotiations with the attackers before the deadline expires, then data is released as a means to pressure the victim into submission.
Lately, some ransomware gangs have taken to using distributed denial of service attacks as a further means of applying pressure on their victims.
The company was contacted at those times but did not offer any comment about the incident.
iTWire has contacted Fisher & Paykel for comment this time as well.
This year, Nefilim has been used in an attack on transport and logistics provider Toll Group, German services provider Dussmann Group, Indian pharmaceutical products manufacturer Indoco Remedies and a subsidiary of France's Orange SA, a telecommunications provider, among others.
Contacted for comment, Brett Callow, a ransomware threat researcher with the security firm Emsisoft, that is based in New Zealand, said: "The fact that groups publish data in instalments is likely not to keep pressure on victims in the hope that they'll eventually pay up.
"It's probably more about making the experience as protracted and as painful as possible in order to send a message to future victims.
"Fisher & Paykel is to be commended for its decision not to pay. If more companies took a similar stance, ransomware would be less of a problem."