[AKIRA] – Ransomware Victim: The Fence People

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.

Ransomware group:
AKIRA
Victim name:
THE FENCE PEOPLE

AI Generated Summary of the Ransomware Leak Page

On November 5, 2025, a ransomware leak post identifies The Fence People as a victim. The Fence People Limited is a Southern Ontario fence contractor established in 1986, specializing in construction hoarding solutions for the commercial, industrial, and institutional sectors. The post claims that attackers gained access to the company’s data and warn that more than 23 GB of corporate documents will be uploaded. The data reportedly includes scans of employee identity documents and other confidential files, such as financial records and customer information. The incident is described as a data leak rather than a system encryption event, and no ransom amount is disclosed in the available data. The post date is November 5, 2025, and no separate compromise date is provided.

According to the leak post metadata, there are currently no attached images or screenshots displayed on the page (the page shows zero images). The attackers indicate an imminent release of a large volume of documents, but the provided data does not include any explicit ransom figure or encryption details. The content is presented in English, with The Fence People retained as the victim name; no other company names are emphasized in this summary. The page’s stated intent centers on data exfiltration and forthcoming disclosure of sensitive files rather than an immediate encryption event.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features