[AKIRA] – Ransomware Victim: Rusin Law

image

Ransomware Group: AKIRA

VICTIM NAME: Rusin Law

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

Rusin Law, a United States–based civil litigation defense firm that handles workers’ compensation matters, is named as a ransomware victim on the leak page attributed to the threat actor group “akira.” The post frames the incident as a data-leak event rather than a purely encrypted breach and claims the attackers have exfiltrated—or are prepared to release—more than 134 GB of Rusin Law’s sensitive documents. The materials described reportedly include financial records (audits, payment details, financial statements, invoices), personnel and client information, and other confidential items such as police protocols and court-related documents. A claim URL is indicated on the page, suggesting a channel for follow-up, but the publicly visible text does not disclose a ransom amount.

According to the leak metadata, there are no screenshots or images on the page (image count is zero). The post date is 2025-08-14, and in the absence of a separate compromise date, this date is treated as the post date. The narrative emphasizes data exfiltration and potential public release of the data, with no explicit ransom figure provided in the accessible content. The described data scope points to corporate financial information and confidential personnel, client, and legal documents that could be exposed if released, with PII redacted in this summary.

Attribution in the page points to the ransomware group “akira.” The claimed data volume (over 134 GB) signals a substantial exposure that could affect Rusin Law’s clients and ongoing matters. The page frames the event as a data-leak scenario rather than a straightforward encryption incident, and the presence of a claim URL hints at potential follow-up actions by the attackers, though no ransom amount is shown in the available content. Defenders should monitor for any subsequent disclosures and conduct risk assessments focused on potential impacts to legal proceedings, financial data, and personnel information.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.