[AKIRA] – Ransomware Victim: Mount Vernon Property Management

image

Ransomware Group: AKIRA

VICTIM NAME: Mount Vernon Property Management

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page pertains to Mount Vernon Property Management, a company specializing in property management services in Sarasota, United States. The attack was publicly disclosed on July 29, 2025, with the breach confirmed by the victim shortly after discovery. The compromised data reportedly includes sensitive financial information such as payment details, financial reports, and invoices, as well as some personal files, including driver’s licenses and customer data. The leak appears to be part of a larger ransomware operation that publicly threatens to release such data to pressure the company for ransom or as retribution. The page includes a screenshot, which possibly depicts internal documents or leaked data, but its contents are not explicitly described. No explicit data or URLs are provided, but the mention of data types indicates serious breaches of confidentiality and privacy, potentially affecting the company’s clients and operations.

The incident highlights the threat posed to businesses in the service industry, especially those handling financial and personal customer data. The leak’s publication date and the nature of the data suggest it may be used for malicious purposes unless timely remediation occurs. The company’s activity is categorized under business services, and the attack underscores the growing risk cybersecurity threats pose to operational continuity and sensitive information security. No additional details about the attackers or the specific ransom demands are provided, but the public leak signals the seriousness of the breach and the need for immediate cybersecurity review and customer notification where applicable.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.