[AKIRA] – Ransomware Victim: Curtis Steel Co
![[AKIRA] - Ransomware Victim: Curtis Steel Co 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On October 17, 2025, a ransomware leak post identifies Curtis Steel Co as a victim, attributed to the threat actor group akira. The company is described as a Las Vegas-based manufacturing tubing supplier offering aluminum, carbon steel, stainless steel, and welding supplies, along with precision services such as steel cutting, laser cutting, metal drilling, and hole punching, with operations dating back to 1970. The leak page frames the incident as a data exfiltration and data-leak event rather than a purely encryption-focused attack, signaling a data-theft scenario consistent with modern ransomware campaigns. The page states that the attackers are ready to upload more than 20GB of data, indicating a substantial exfiltration volume and a willingness to publicly release or otherwise leverage the stolen information in extortion. No ransom amount is visible in the post text, which centers on the scope of compromised data rather than a specified demand.
According to the leak description, the data targeted for disclosure includes sensitive corporate documents such as financial data (audits, payment details, financial reports, invoices) and highly detailed employee and customer information, including types of personal data like driver’s license numbers, Social Security Numbers, medical information, emails, and phone numbers, as well as NDAs and other confidential documents. The page notes there are no visible images or screenshots on the leak post itself, and there is no posted website link. The post date is listed as October 17, 2025, which is treated as the leak’s posting date in the absence of a separate compromise date. This event highlights ongoing ransomware risk to the US manufacturing sector, particularly for firms handling extensive supplier and customer data, and aligns with observed double-extortion patterns in contemporary campaigns.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
