[AKIRA] – Ransomware Victim: Saxun by Giménez Ganga

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.

Ransomware group:
AKIRA
Victim name:
SAXUN BY GIMÉNEZ GANGA

AI Generated Summary of the Ransomware Leak Page

On October 30, 2025, a leak post published by the threat actor group akira concerns Saxun by Giménez Ganga, a Spanish manufacturing firm. Saxun by Giménez Ganga designs and manufactures smart sun protection systems for homes and businesses. The post states that Saxun by Giménez Ganga has been compromised in a ransomware-style intrusion and that the attackers intend to upload 320 GB of corporate documents soon. The materials referenced include projects and client files, drawings and specifications, employee information, and contracts and NDAs. The leak is framed as a data-leak event rather than an encryption incident, and there is no ransom demand or figure mentioned in the excerpt. The page indicates there are no screenshots or images attached at this time.

From a threat intelligence perspective, the post signals a data-leak scenario with potential exposure of sensitive internal information, including project details, client data, design drawings, employee information, contracts, and NDAs. The stated volume—320 GB—suggests a sizable cache that could impact competitive secrets, business relationships, and regulatory considerations if released. There is no explicit encryption status described and no ransom amount or deadline provided in the post, which centers on data exfiltration rather than immediate monetary extortion. The post date is 2025-10-30, and no separate compromise date is provided, so the date reflects the post date. No URLs or image assets are evident in the post, and the focus remains on the stated victim name without introducing additional company names.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features