Akira Ransomware Group Claims Cyberattack on Spain’s STE Group and Exfiltrating 30GB of Data

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

The Akira ransomware group has alleged responsibility for a significant breach targeting STE Group, a Spain-based pharmaceutical engineering and healthcare company. According to claims made on the group’s dark web leak site, over 30GB of sensitive data has been exfiltrated.

The data reportedly stolen includes Corporate NDAs (Non-Disclosure Agreements), financial information, and contact details:

Akira's post alleging STE Group breach
Akira's post alleging STE Group breach | Source: HackManac on X

The Akira group threatened to release this information, a tactic commonly used to pressure entities into paying hefty ransoms in exchange for keeping stolen data private.

The Akira ransomware group emerged in early 2023 and has rapidly gained notoriety for targeting businesses across multiple industries. The group utilizes double-extortion tactics, exfiltrating data before encrypting systems to maximize leverage over their victims. 

They have mainly focused on organizations with weak cybersecurity defenses or outdated data protection protocols.

Recently, a security expert reverse-engineered the Akira ransomware process and discovered the encryption’s timing mechanism flaws, so the group’s victims have a way to potentially retrieve their locked data.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: