[AKIRA] – Ransomware Victim: Tenryu America

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.

Ransomware group:
AKIRA
Victim name:
TENRYU AMERICA

AI Generated Summary of the Ransomware Leak Page

Tenryu America, a United States–based manufacturer of carbide saw blades, is identified as a ransomware leak victim in a post dated October 17, 2025. The leak entry attributes the breach to a threat actor and presents the incident as a data-leak event rather than a traditional encryption-and-recovery scenario. The attackers claim to have exfiltrated sensitive corporate information and to be prepared to upload or publish it. The claimed data types include employee information (dates of birth, addresses, and phone numbers), client data, financial records, contracts, and NDAs. No ransom amount is visible in the post. A compromise date is not provided; the post date serves as the timestamp. The post lists the United States as the victim’s country; the industry field is Not Found in the dataset, but the description identifies Tenryu America as a blade manufacturer. The leak is described as data exposure rather than encryption, consistent with a data-leak scenario.

Evidence of media on the leak page appears minimal: the dataset shows zero images or screenshots and no downloadable files or linked resources. The post states that it is ready to upload corporate documents, signaling a public data exposure threat and potential data release unless a resolution is reached. The text references employee PII such as dates of birth, addresses, and phone numbers, though such details are redacted in this summary. No URLs or contact details are visible in the extracted data; any references would be defanged if present. The victim name remains Tenryu America; no other company names are relevant to this summary. The post date remains October 17, 2025, and no separate compromise date is provided, so this date serves as the publication timestamp for the incident report.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features