Ransomware victim disclosure
← All victimsMotorpal
Claimed by Akira · listed 2 months ago
Status timeline
- Listed
Mar 20, 2026
- Data leaked
At a glance
- Group
- Akira
- Status
- Data leaked
- Country
- Czech Republic
- Sector
- Manufacturing
- Listed on leak site
- Mar 20, 2026
- Data size
- 31 GB
About the victim
AI dossier — public-source company profileMotorpal, a.s. is a Czech manufacturer of injection systems for diesel engines, established in 1946. The company produces injection pumps, injectors, and spare parts, and also provides sales and service support for its products.
- Industry
- Diesel Engine Injection Systems Manufacturing
- Founded
- 1946
Attack summary
Severity: high — Confirmed exfiltration of 31 GB including employee PII (addresses, phones, scanned documents), detailed HR data, and sensitive business records (financials, contracts, projects); data is stated as published/pending upload, indicating a significant and broad data breach.Akira claims to have exfiltrated 31 GB of corporate data from Motorpal, including employee personal information, HR records, financial data, partner files, contracts, and project documents, with publication described as imminent.
Data the group says was taken
AI dossier — extracted from the leak post- Employee personal information (addresses, phone numbers)
- Scanned employee documents
- HR records
- Financial data
- Partner files
- Contracts
- Project files
What the group claims
MOTORPAL, a. s. is a prominent manufacturer of injection systems for diesel engines, established in 1946. The company specializes in producing a range of products including injection pumps, injec tors, and spare parts, as well as providing sales and service sup port. We will upload 31gb of corporate data soon. Employee personal inf ormation (addresses, phones, scanned documents and so on), detail ed HR data, financials, partners files, contracts, projects, and so on.
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
