[AKIRA] – Ransomware Victim: Ostrolenk Faber

image

Ransomware Group: AKIRA

VICTIM NAME: Ostrolenk Faber

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

Ostrolenk Faber is identified as the victim on the leak page associated with the Akira group. The firm is described as a premier intellectual property boutique law practice with a history dating back to 1929. The post, dated October 14, 2025, asserts that attackers are prepared to upload more than 43 GB of corporate documents. The materials referenced include employees’ personal documents and client information, along with project files, financials, confidential project files, contracts, NDAs, and related records. The post does not specify a compromise date beyond the post date and does not disclose a ransom amount. The page presents a data-leak scenario rather than an encryption event.

The leak page shows no screenshots or images and contains no downloadable files or claim URLs in the provided data. It frames the incident as a potential public release of exfiltrated data if demands are not met, highlighting the risk to Ostrolenk Faber and its clients from exposure of sensitive internal and client information. Personal identifiers are referenced in general terms within the described materials, but any such details are redacted in this summary. The victim name is preserved for context, while other company names appearing in the source are not emphasized here. Overall, the entry underscores ransomware threats to professional services firms handling highly sensitive information.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.