[AKIRA] – Ransomware Victim: Heierli
![[AKIRA] - Ransomware Victim: Heierli 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: AKIRA
VICTIM NAME: Heierli
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The recent ransomware incident targeted a company operating in civil engineering and related fields in Switzerland. The attack was discovered on April 15, 2025, with the breach date also recorded as the same day. The hack resulted in the unauthorized access and potential exfiltration of over 92 GB of sensitive corporate data, including contact information for employees and clients, financial records, audits, and nondisclosure agreements. The leak poses significant risks to the company’s operational security and confidentiality, highlighting the severity of the breach. The page includes screenshots indicating internal documents and data that may be at risk, emphasizing the importance of prompt incident response and mitigation measures.
The incident was publicly announced by the threat group ‘Akira,’ which claims responsibility for the attack. Their message indicates that additional data may be uploaded if demands are not met. There is evidence that the attackers have access to various parts of the company’s digital infrastructure, although no specific download links or files are directly provided on the leak page. The company’s activity is primarily construction management and consulting, which underscores the potential impact on project timelines and client trust. No personally identifiable information of employees or third parties is disclosed, but the data leak underscores the critical need for cybersecurity vigilance in industries handling sensitive project and financial information.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.