[AKIRA] – Ransomware Victim: G & H Distributing
![[AKIRA] - Ransomware Victim: G & H Distributing 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On October 29, 2025, a ransomware leak post attributed to the threat group Akira targets G & H Distributing. The victim is described on the leak page as a prominent agricultural and industrial supply distributor based in South Dakota, with retail and wholesale operations. The post frames the incident as a data-exfiltration event rather than a conventional encryption, and states that corporate documents will be uploaded in the near term. The attackers claim access to sensitive employee information, noting that payroll-related 2-9 forms containing addresses, phones, emails, and other personal details may be exposed, in addition to internal accounting files, project data, and client information. The post signals that additional documents will be released in the future, indicating ongoing exfiltration activity. There is no ransom amount listed on the page, and there are no screenshots or images currently presented. The post date is October 29, 2025, and no separate compromise date is provided on the page, so the post date is treated as the publish date.
The leak page’s content implies a risk to employee personal information and internal corporate records if the data is released publicly, given references to payroll records and internal files. However, no actual files, images, or media are visible on the page at this time. The page is attributed to the Akira threat group, and there is no stated ransom figure or encryption claim on this post. The description notes that “corporate documents” will be uploaded soon, suggesting an ongoing data-exfiltration campaign rather than a completed encryption incident. Security observers should monitor for subsequent postings from the same actor for potential additional material and to assess any real-world exposure or notification requirements for the victim.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
