[AKIRA] – Ransomware Victim: Sadler Gibb & Associates
![[AKIRA] - Ransomware Victim: Sadler Gibb & Associates 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On October 29, 2025, a ransomware leak page attributed to the threat actor group “akira” identifies Sadler Gibb & Associates as a victim. Sadler Gibb & Associates is a United States–based certified public accounting firm offering services such as tax planning and preparation, financial statement audits, business advisory, bookkeeping, and payroll processing. The post states that the attackers claim to have gained access to the firm’s network and are prepared to upload more than 65GB of data, signaling a data-leak event rather than a purely encryption-based incident. There is no explicit compromise date provided on the leak page; the date shown here is treated as the post date.
The materials described as at risk include financial data—audits, payment details, and invoices—and highly sensitive personal information about employees and clients, such as government-issued identifications (passports, driver’s licenses), Social Security numbers, birth/death certificates, medical information, and contact details (emails and phone numbers). The page also references confidential information and NDAs, indicating a broad collection of documents containing personal identifiers. The post does not specify a ransom amount, and there are no visible downloads or claim links associated with the leak entry. In addition, there are no screenshots or images presented on the leak page (the page shows zero images).
From a threat intelligence perspective, the page aligns with ransomware patterns that threaten to exfiltrate large volumes of sensitive data in the financial services sector. The post date is the only date available in the record, and no compromise date is provided beyond this post date. The incident underscores the risk to firms handling client financial data and personal information, highlighting the potential impact on both the target and its clients even in the absence of an openly published ransom figure.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
