Ransom! PennantPark

The ransomware claim alleges that the threat actor akira has uploaded over 6 GB of sensitive documents from PennantPark, a US-based middle market credit provider, using torrent technology with a shared magnet link and password to facilitate data theft and potential misuse. The incident impacts the United States.

Incident Details

  • Victim: PennantPark
  • Country: US
  • Actor: akira
  • Source:
  • Discovered: 2025-07-07 16:42:04.435985
  • Published: 2025-07-07 16:41:59.708023

Information

  • Prepared to upload over 6 GB of documents including employee data, financial information, and confidential reports.
  • Made the process of downloading company data user-friendly by providing a magnet link and instructions.
  • Compatible with various torrent clients such as Vuze, uTorrent, qBittorrent, or Transmission.
  • Instructions include opening a torrent client, adding the torrent file or magnet URL, and using the password β€œpennantpark.com” to access the data.
  • Provided the magnet URL for data download: magnet:?xt=urn:btih:8699898E899408169F9FE893112C1ED8A660285B&dn=pennantpark.com&tr=udp://tracker.openbittorrent.com:80/announce&tr=udp://tracker.opentrackr.org:1337/announce.

Disclaimer: This post is based on public claims made by the ransomware group "akira". I cannot confirm the accuracy of the information. However, I would be happy to share any official statement from the affected organization to provide clarification.

monitored by: ransomware.live