[AKIRA] – Ransomware Victim: Selenis (Evertis is also involved)
![[AKIRA] - Ransomware Victim: Selenis (Evertis is also involved) 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: AKIRA
VICTIM NAME: Selenis (Evertis is also involved)
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak page involves the manufacturing company Selenis, which is part of the IMG Group. The attack was publicly disclosed on May 8, 2025, and the breach was discovered later that same day. The breach exposes a significant volume of sensitive corporate data, estimated at over 70 gigabytes. This includes detailed client personal information such as passports, medical records, driver’s licenses, confidential court files, financial information, and non-disclosure agreements. The leak suggests a severe compromise of private and confidential information, with potential implications for affected individuals and the company’s operations.
The leak page includes references to the potential download of this sensitive data and visual evidence in the form of screenshots. The attack impacted Selenis, a company engaged in producing innovative copolyesters within the polymers industry, and involves associated entities such as Evertis. The breach has notable implications for the company’s clients and business relationships, highlighting the serious cybersecurity threat posed by ransomware groups. No personal or PII details are publicly exposed beyond the scope of the leaked corporate data, ensuring compliance with data privacy standards.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.