[AKIRA] – Ransomware Victim: Steel Encounters
![[AKIRA] - Ransomware Victim: Steel Encounters 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: AKIRA
VICTIM NAME: Steel Encounters
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
Steel Encounters, a US-based manufacturing subcontractor that provides steel joist and metal deck products, glazing, curtain walls, and architectural cladding systems to general contractors, architects, and building owners, is named as the victim. The leak page is attributed to the Akira ransomware group and presents the incident as a data-leak event rather than a conventional encryption breach. The attackers claim they have captured a large trove of corporate documents and are prepared to upload more than 21 GB of data, including financial records and sensitive personal information tied to employees and customers. A claim URL is indicated on the page, though the exact link is not provided in the data. The entry carries a post date of August 20, 2025; in the absence of a specified compromise date, this post date serves as the temporal reference for the leak entry.
The page outlines the scope of data allegedly captured, including financial data—such as audits, payment details, financial reports, and invoices—and personal information related to employees and customers (for example, identification documents, civil records, medical information, emails, and phone numbers). The description emphasizes the sensitivity and potential privacy and regulatory implications of exposing such material. According to the metadata, there are no screenshots or image assets reported for this entry, and no downloads are listed in the dataset. The post frames this as a data-leak scenario and hints at the possibility of additional material being released or made available, consistent with ransomware extortion practices. For privacy, any personal data categories in this summary have been redacted.
From a threat intelligence perspective, the Steel Encounters incident underscores ongoing risk to the manufacturing sector, particularly for subcontractors handling confidential financial and personnel information. The combination of a sizable data claim and a public post aligns with common extortion patterns aimed at pressuring victims or monetizing the leak. The post date remains August 20, 2025, and there is no separate compromise date provided beyond this timestamp. The operation is attributed to the Akira actor group, which aids attribution for ongoing monitoring and correlation with related campaigns. The focus remains on Steel Encounters as the identified victim, and other company names mentioned in the leak text are not the subject of this summary.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.