[AKIRA] – Ransomware Victim: Morehead State University
Ransomware Group: AKIRA
VICTIM NAME: Morehead State University
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the AKIRA Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The ransomware leak page pertains to Morehead State University, which is located in the United States and operates within the education sector. The university is noted for its comprehensive array of undergraduate and graduate programs, as well as emerging doctoral programs with a strong focus on regional engagement. According to the leak, the university suffered a significant data breach that has compromised extensive amounts of sensitive information. Despite the university’s President, Jay Morgan, stating that “no personal data has been compromised,” the attackers claim otherwise and have threatened to make all stolen data publicly accessible due to a lack of communication from the university’s side.
The leaked content reportedly includes crucial personal information related to students and employees, as well as financial and marketing data, now available for download via torrent protocols. The instructions provided highlight the ease with which users can access this data utilizing any standard torrent client. Links to download the data are offered, alongside guidance on how to initiate the downloading process, emphasizing that the archives are not password protected. The post indicates that the data was discovered on November 14, 2024, underscoring the urgency and seriousness of the breach for the affected institution.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.