[AKIRA] – Ransomware Victim: TrussWorks International

image

Ransomware Group: AKIRA

VICTIM NAME: TrussWorks International

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

This ransomware leak concerns TrussWorks International, a manufacturing company based in the United States specializing in engineering, design, fabrication, and assembly services. The attack was carried out on April 18, 2025, and the leak was discovered a few days later on April 21, 2025. The threat actors claim to have exfiltrated over 13 gigabytes of critical corporate data, including sensitive documents such as contact details of employees and clients, social security numbers, phone numbers, addresses, driver’s licenses, financial records, and non-disclosure agreements. The compromised data could potentially impact the company’s operations and client privacy.

The leak page indicates that the attackers plan to upload the stolen data publicly, which could cause significant harm to the company’s reputation and legal standing. The compromised information includes confidential corporate data, financial reports, audit documents, and personal identifiers, posing a serious risk of identity theft and corporate espionage. The page features a simple interface with no detailed screenshots or images, but it suggests the presence of extensive data leaks. No additional links or files are directly provided on the leak page, but the threat of data exposure remains significant. The attack highlights vulnerabilities within the company’s security posture, emphasizing the importance of robust cybersecurity measures in the manufacturing sector.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.