[AKIRA] – Ransomware Victim: Keystone Shipping

image

Ransomware Group: AKIRA

VICTIM NAME: Keystone Shipping

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page affects Keystone Shipping, a historic U.S. shipowner and operator founded in Philadelphia in 1909. The breach appears to have occurred on June 24, 2025, with the data discovered and disseminated shortly thereafter. The exposed information includes a variety of sensitive corporate documents, such as employee personal information, detailed financial data, corporate non-disclosure agreements, and blueprints of cargo ships. This leak could pose significant security and operational risks to the victim, as attackers have uploaded critical internal data to the dark web. The leak may involve the publication of documents that could be used for further malicious activities or corporate espionage.

The incident highlights the threat posed to organizations in the transportation and logistics sector, especially those with long-standing histories like Keystone Shipping. The leak content suggests that the attackers gained access to confidential files that could impact operational integrity and competitive positioning. No images or screenshots of the data are available from the leak page. There is an indication that potential download links or leaked data are present, but specific details or URLs are not included in this report. The breach underscores the importance of robust cybersecurity measures to safeguard sensitive corporate information from such disruptive attacks.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.