Ransomware victim disclosure
← All victimsSid Harvey Industries
listed as Sid Harvey's · Claimed by akira · listed 13 hours ago
Status timeline
- Listed
May 20, 2026
- Data leaked
At a glance
- Group
- akira
- Status
- Data leaked
- Country
- US
- Sector
- Consumer Services
- Listed on leak site
- May 20, 2026
About the victim
AI dossier — public-source company profileSid Harvey Industries is a wholesale distributor of refrigeration, air conditioning, and heating equipment and parts serving contractors across the United States. The company operates in the B2B HVAC supply sector.
- Industry
- Wholesale Distribution - HVAC Equipment & Parts
- Employees
- 500
Attack summary
Severity: critical — Confirmed exfiltration and publication of regulated PII at scale (~500 employees) including SSNs, financial records, passports, and driver's licenses, plus sensitive corporate data. This meets critical threshold for regulated personal data exposure.The Akira group claims to have exfiltrated approximately 740 GB of corporate data, including detailed employee personal information (passports, driver's licenses, SSNs, financial records), contracts, financial records, and client/partner information. Data has been published.
Data the group says was taken
AI dossier — extracted from the leak post- employee passports
- employee driver's licenses
- employee social security numbers
- employee personal financial records
- death certificates
- credit cards
- confidential agreements
- corporate contracts
- financial records
- client information
- partner information
What the group claims
Sid Harvey Industries is a wholesale distributor of refrigeration, air conditioning, and heatin g equipment and parts for contractors in the United States. We will upload 740gb of corporate data soon. Detailed employee personal information (~500 ppl p assports, DLs, SSNs, personal financials, death certs, confidential agreements, credit cards an d so on), contracts and agreements, financials, clients and partners, etc.
Source
Indexed 13 hours agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
