The ransomware attack on Studio Verna Società Professionale in Italy resulted in the theft of 7 GB of sensitive financial, legal, and personnel data, which was made accessible via a magnet link for download. The threat actor, akira, facilitated data exfiltration through a torrent file, emphasizing the breach’s severity and the compromised information’s availability. #Italy
Incident Details
- Victim: Studio VernaSociet,à Professionale
- Country: IT
- Actor: akira
- Source:
- Discovered: 2025-07-07 15:44:23.498589
- Published: 2025-07-07 15:44:20.855503
Information
- Access to 7 GB of sensitive documents including financial data, client information, agreements, project details, and employee records.
- A simple download process using popular torrent clients such as Vuze, uTorrent, qBittorrent, or Transmission with magnet links.
- Users need only to open their torrent client, add the torrent file or paste the magnet URL, and enter the provided password to securely download data.
- The provided password for access is sleepyhollowcc.org.
- Magnet URL: magnet:?xt=urn:btih:9632AFDC95E139AA46CE7C2FD7977EFC20891B24&dn=studioverna.it&tr=udp://tracker.openbittorrent.com:80/announce&tr=udp://tracker.opentrackr.org:1337/announce.
Disclaimer: This post is based on public claims made by the ransomware group "akira". I cannot confirm the accuracy of the information. However, I would be happy to share any official statement from the affected organization to provide clarification.