[AKIRA] – Ransomware Victim: Exotherm
![[AKIRA] - Ransomware Victim: Exotherm 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: AKIRA
VICTIM NAME: Exotherm
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
Exotherm Corporation, a United States-based manufacturer described as a leader in heating device development, is identified as the victim on the leak post. The post, attributed to the threat actor group “akira” and dated August 21, 2025, claims the attackers are prepared to upload more than 30 GB of essential corporate documents. The material described includes financial data (audits, payment details, invoices) and personal information of employees and customers (such as Social Security numbers and phone numbers), along with confidential information, NDAs, and other documents containing detailed personal data. The page frames this as a data-leak incident resulting from the breach, consistent with ransomware operators’ practice of exfiltrating data for public release.
The leak page provides no visible screenshots or images; the accompanying metadata indicates zero images. No ransom amount or explicit demand is documented in the post. Because no separate compromise date is provided beyond the posted date, August 21, 2025, this date is treated as the post date. Exotherm is listed as based in the United States, with the industry field not provided. Overall, the post emphasizes the potential exposure of financial and personally identifiable information, underscoring the ongoing risk ransomware actors pose to organizations handling sensitive data.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.