[AKIRA] – Ransomware Victim: Cohn Lifland Pearlman Herrmann and Knopf

image

Ransomware Group: AKIRA

VICTIM NAME: Cohn Lifland Pearlman Herrmann and Knopf

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page reports a significant data breach involving the law firm Cohn Lifland Pearlman Herrmann and Knopf. The attackers claim to have exfiltrated approximately 110 GB of sensitive files, including personal identification documents such as passports, driver’s licenses, birth and death certificates, along with extensive correspondence and contact details. Additionally, the leak contains confidential financial statements and other proprietary documents of the firm, highlighting the severity of the breach. The attack was publicly disclosed on April 25, 2025, and the hackers state they will upload the files shortly, indicating ongoing data leaks. There is no specific attack date prior to this disclosure, but the incident is recent and noteworthy for its sensitive content.

The breach underscores serious security lapses, with the attackers emphasizing that the targeted firm failed to protect client information adequately, even amidst an active cyber insurance policy. The leak exposes a wide array of personal and confidential information, putting clients’ privacy at risk. The page indicates that the attackers have captured data such as personal identification credentials, confidential correspondence, and financial details, which could be exploited maliciously. No URLs or direct download links are provided in this summary, but the mention of uploading files suggests that data may soon become publicly available. The incident has garnered attention due to the volume and sensitivity of the leaked data, underscoring the importance of cybersecurity in protecting client and organizational information.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.