[AKIRA] – Ransomware Victim: Sogedis
![[AKIRA] - Ransomware Victim: Sogedis 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: AKIRA
VICTIM NAME: Sogedis
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak page details a security incident involving Sogedis, a French company specializing in household appliances. The attack was publicly disclosed on July 22, 2025, and involves the potential exposure of a significant volume of corporate data. The compromised data is reported to include approximately 10 GB of sensitive information, encompassing client and employee personal data, financial records, and confidential agreements with major corporations such as Siemens, Whirlpool, Samsung, Electrolux, Indesit, and Bosch. The leak site suggests that the attackers are prepared to publish this data unless demands are met, emphasizing its potential impact on the company’s operations and reputation.
The page includes references to the attack date as July 22, 2025, and highlights the threat to the company’s confidential information. It indicates that the attackers, associated with a group named “akira,” have not publicly released the data as of the latest update but may do so imminently. The leak encompasses a broad range of sensitive documents, potentially including corporate records, client details, and contractual agreements, which could pose significant risks if disclosed. While specific download links or leaked files are not provided, the listing underscores the seriousness of the breach and the potential for substantial data exposure.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.