Ransomware victim disclosure
← All victimsNijborg Staal
Claimed by akira · listed 10 days ago
Status timeline
- Listed
May 11, 2026
- Data leaked
At a glance
- Group
- akira
- Status
- Data leaked
- Country
- NL
- Sector
- Manufacturing
- Listed on leak site
- May 11, 2026
About the victim
AI dossier — public-source company profileNijborg Staal B.V. is a Dutch company specializing in the delivery and installation of steel constructions, stairs, and railings, as well as various special metal works. The company operates in the Netherlands and positions itself as a reliable, flexible, and service-oriented partner with a focus on high-quality standards across its projects.
- Industry
- Steel Construction & Metal Works
Attack summary
Severity: high — Confirmed exfiltration claim includes regulated personal data (passports, ID cards constituting PII) alongside significant business data (financials, contracts, project specifications); data has not yet been published but disclosure is stated as imminent, placing this at high severity with potential to reach critical upon publication.The Akira ransomware group claims to have exfiltrated approximately 10 GB of corporate data from Nijborg Staal B.V., including employee personal identification documents, contracts, project documentation, and financial records, with publication of the data described as imminent.
Data the group says was taken
AI dossier — extracted from the leak post- Employee passports and ID cards
- Employment contracts
- Project drawings and specifications
- Financial records
- Corporate documents
What the group claims
Nijborg Staal B.V. specializes in the delivery and installation of steel constructions, stairs, and railings, as well as various special metal works. The company prides itself on being a rel iable, flexible, and service-oriented partner, ensuring high-quality standards in all projects. We will upload 10gb of corporate data soon. Employee personal information (passports, ID cards and so on), contracts, projects information (drawings, specifications, etc), financials and so on.
Source
Indexed 10 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
