[AKIRA] – Ransomware Victim: Drywall Partitions

image

Ransomware Group: AKIRA

VICTIM NAME: Drywall Partitions

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page for Drywall Partitions, Inc., a company operating in the construction industry, surfaced on January 7, 2025. The leak highlights the company’s focus on drywall construction for new and remodeling projects, with particular attention to tenant finish build-outs. The disclosure suggests that a significant amount of sensitive corporate data is at stake, including internal financial documents and private corporate correspondence. These documents reportedly contain personally identifiable information such as Social Security Numbers (SSNs), employee contact information, and email addresses, which could pose risks to the affected individuals and the company’s operations.

Furthermore, the leak indicates the potential upload of a wide array of private documents, which may exacerbate the company’s vulnerability to further exploitation. This incident underscores the critical need for robust cybersecurity measures, particularly for businesses in the construction sector, where sensitive data management is often less scrutinized. The leak page does not specify the number of affected employees or third parties, suggesting a broader impact may be envisioned. No screenshots or specific download links were provided on the leak page, but the implication of such vulnerabilities remains a pressing concern for the organization’s security posture.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.