Ransom! Flagship Bank

Akira, a threat actor, claims to have compromised Flagship Bank in the US by potentially uploading approximately 40 GB of sensitive corporate data, including client information, financial records, contracts, and certificates. The bank is a community-rooted institution owned by local shareholders and operated by experienced local bankers, and the incident affects the US. #US

Incident Details

  • Victim: Flagship Bank
  • Country: US
  • Actor: akira
  • Source:
  • Discovered: 2025-05-27 16:37:15.909629
  • Published: 2025-05-27 00:00:00.000000

Information

  • Flagship Bank was targeted in a ransomware attack.
  • The actor responsible for the attack is identified as Akira.
  • The bank was founded by a local Board of Directors and is owned by committed local shareholders.
  • It is operated by successful local bankers with deep community roots.
  • The attacker planned to upload approximately 40 GB of corporate data.
  • The data includes a large amount of client information such as DOB, SSN, passport numbers, addresses, driver’s licenses, and phone numbers.
  • The compromised data also contains detailed financial records, contracts, agreements, and certificates.

Disclaimer: This post is based on public claims made by the ransomware group "akira". I cannot confirm the accuracy of the information. However, I would be happy to share any official statement from the affected organization to provide clarification.

monitored by: ransomware.live