A first lot of documents was released early in June with links being posted on the dark web.
Links to the new documents have been released as a text file and a zipped archive as the first lot were. They appear to again contain mostly financial documents.
Fisher & Paykel, which is based in New Zealand, operates in 50 countries and does its manufacturing in Thailand, China, Italy and Mexico, according to Wikipedia.
A screenshot from the Nefilim site on the dark web. Supplied
In the past, the company has not responded to a request for comment. Last time, iTWire found that Fisher & Paykel had no media contacts or email addresses listed on its Australian website. Its New Zealand site had no contacts either and appeared to be out of date, with the latest press releases posted there being from 2018.
At the time, iTWire wrote to a media contact listed on one of those 2018 releases.
Now Fisher & Paykel has a line saying, "For media enquiries please contact: Andrew Luxmoore, Senior Corporate Communications Specialist", without giving any indication as to how this man can be contacted. An email address for him was obtained by chatting with a bot on the company's website.
Any reaction will be included in this story as soon as it is received.
Nefilim, which recently attacked logistics and transportation firm Toll Holdings, is one of the growing number of ransomware that exfiltrates victims' files before encrypting them on-site.
This, in effect, means that any victim is hit by both a data breach and also loses access to his/her files.
Contacted for comment, Brett Callow, a ransomware threat researcher from the New Zealand-headquartered security shop Emsisoft, said: "Nefilim publishes data in a series of instalments to maintain pressure on the company and, no doubt, to demonstrate to future victims that they can inflict pain well beyond the initial attack.
"Like Lion, F&P is to be commended for its decision to refuse to meet the criminals’ demands, but not for its security. "