[AKIRA] – Ransomware Victim: Soapy Joe’s Car Wash

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.

Ransomware group:
AKIRA
Victim name:
SOAPY JOE’S CAR WASH

AI Generated Summary of the Ransomware Leak Page

On November 6, 2025, a leak post attributed to the akira ransomware group identifies Soapy Joe’s Car Wash as a victim of a ransomware incident. Soapy Joe’s Car Wash is described as a United States–based consumer services business, noted as “Voted Best Car Wash in San Diego” and a Guinness World Record holder. The post states that the attackers plan to upload more than 40 GB of corporate documents and claims they have obtained personal information of all employees, including phones, addresses, driver’s licenses, passports, almost 2,000 Social Security numbers, and medical information. It also references detailed financials, confidential files, contracts and NDAs, partner information, and other sensitive materials.

The leak page appears to frame this as a data-leak scenario, with the promise of additional material being released. There is no explicit ransom amount or encryption status described in the posted content. The post date is November 6, 2025; no compromise date is provided, so this date is treated as the post date. The page shows no screenshots or images, and there are no direct download links presented.

In summary, Soapy Joe’s Car Wash is presented as a victim of a data-exfiltration operation, with the attackers claiming access to broad employee PII and confidential corporate data and threatening the release of more than 40 GB of documents. The post attributes the incident to the akira group and emphasizes risk to employees and the company’s confidential information. The leak page does not include a ransom figure within the posted content and contains no visual artifacts such as screenshots.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features