Ransomware victim disclosure
← All victimsINP Schweiz
Claimed by Akira · listed 2 months ago
Status timeline
- Listed
Mar 20, 2026
- Data leaked
At a glance
- Group
- Akira
- Status
- Data leaked
- Country
- Switzerland
- Sector
- Not Found
- Listed on leak site
- Mar 20, 2026
- Data size
- 9 GB
About the victim
AI dossier — public-source company profileINP Schweiz AG is a Swiss engineering firm that partners with leading companies in the energy generation and transmission sector. The company provides comprehensive engineering services including concept development, planning, commissioning, and testing. It has documented contractual relationships with major industry players such as Siemens.
- Industry
- Energy Engineering Services
Attack summary
Severity: high — Confirmed exfiltration of 9 GB of sensitive corporate data including employee PII (passports, driver's licenses), HR records, financial data, and client/contract information from a critical-infrastructure-adjacent energy engineering firm; data has been announced for imminent publication.Akira claims to have exfiltrated approximately 9 GB of corporate data from INP Schweiz AG, including employee personal identification documents (passports, driver's licenses), HR files, financial records, client files, and contracts with Siemens and other partners; the data is described as forthcoming for publication.
Data the group says was taken
AI dossier — extracted from the leak post- Employee passports
- Employee driver's licenses
- HR files
- Financial records
- Client files
- Contracts (including with Siemens)
What the group claims
INP Schweiz AG partners with leading companies in the energy gene ration and transmission sector, providing comprehensive engineeri ng services that include concept development, planning, commissio ning, and testing. We will upload 9gb of corporate data soon. Employee personal info rmation (passports, DLs and os on), HR files, financials, client files, contracts with Siemens and others, etc.
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
