Ransomware victim disclosure
← All victimsABI and Ideal Tape
Claimed by akira · listed 15 days ago
Status timeline
- Listed
May 6, 2026
- Data leaked
At a glance
- Group
- akira
- Status
- Data leaked
- Country
- US
- Sector
- Manufacturing
- Listed on leak site
- May 6, 2026
About the victim
AI dossier — public-source company profileABI and Ideal Tape are subsidiaries of American Biltrite Inc., a US-based manufacturer with roots dating to 1908. The company produces friction tapes and related adhesive tape products, distributing them globally through a network of industry-focused distributors and converters. Their product lines serve industrial and commercial markets worldwide.
- Industry
- Adhesive & Specialty Tape Manufacturing
- Founded
- 1908
Attack summary
Severity: high — Akira claims confirmed exfiltration of 11 GB of data with status marked as data_published, including employee PII and customer records, constituting significant business and personal data exposure at scale.Akira claims to have exfiltrated approximately 11 GB of corporate data from ABI and Ideal Tape, with data described as published. The stolen data reportedly includes employee personal information, customer files, project files, contracts, and internal confidential documents.
Data the group says was taken
AI dossier — extracted from the leak post- Employee personal information
- Customer files
- Project files
- Contracts
- Internal confidential files
What the group claims
From the creation of our very first line of friction tapes in 1908, we have stuck to our belief in developing quality products, holding ourselves to the highest standards. ABI Tapes products are primarily sold through a worldwide network of select industry-focused distributors and con verters. ABI and Ideal Tape are subsidiaries of American Biltrite Inc. We will upload 11gb of corporate data soon. Employee personal information, customer files, proj ects, contracts, internal confidential files, etc.
Sources
- Victim siteabitape.com
Source
Indexed 15 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
