[AKIRA] – Ransomware Victim: Ondunova
![[AKIRA] - Ransomware Victim: Ondunova 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: AKIRA
VICTIM NAME: Ondunova
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak page associated with Grup Ondunova indicates a significant data breach involving the prominent corrugated cardboard packaging manufacturing group based in Catalonia, Spain. The breach has reportedly resulted in the potential exposure of more than 31 GB of vital corporate documents. This includes non-disclosure agreements, financial audits, payment details, internal correspondence, and various contact details connected to employees and customers. The described nature and depth of the leak point to serious implications for the company’s operations and stakeholder confidentiality, highlighting urgent cybersecurity considerations.
The breach was discovered on February 19, 2025, with the published date of the associated leak reflecting the same date. While the exact details surrounding the incident remain unspecified, the group operates through its constituent companies, Ondunova and Wondu, each with production facilities located in Santa Margarida i Els Monjos, Barcelona. The leaked information may pose substantial risks, as it contains sensitive financial and personal information that could be exploited for malicious purposes. The page does not provide any direct links for downloads; however, it confirms the existence of sensitive data that may have been compromised during the ransomware attack.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.