
On Oct. 2, 2024, the ransomware group known as Akira claimed responsibility for a cyberattack targeting Pyramid ETC Companies, LLC, a general contractor specializing in large-scale affordable housing construction and rehabilitation.
According to the group’s dark web posting, they accessed and exfiltrated approximately 10 GB of sensitive organizational data.
The group claimed the compromised data included a wide range of personally identifiable information (PII) such as Social Security numbers, passports, driver’s licenses, birth certificates and other personal documents. Additionally, the attackers claim to have obtained non-disclosure agreements, contracts and detailed financial records.
The breach was officially disclosed to the Massachusetts Office of Consumer Affairs and Business Regulation on Mar. 5, 2026.
Notably, the regulatory filing dates the breach as having occurred sometime in October 2025. The reason for this discrepancy is unknown, including whether ETC experienced multiple data breaches or whether the filing itself is incorrectly dated.
Despite the ransomware group's claims, the only exposed type of consumer information confirmed in public filings is Social Security numbers.
At this time, the breach affected four individuals in Massachusetts.
Following the discovery of the ransomware attack, ETC Companies provided guidance to those impacted, including recommendations to monitor credit reports for suspicious activity and to file a police report if identity theft is suspected.
The notice to consumers, which is included in full at the bottom of the article’s page, outlines steps for reporting suspected identity theft to local law enforcement and the Federal Trade Commission. It also provides resources for placing fraud alerts and security freezes on credit files.
Given the nature of the breach and the involvement of a ransomware group, it is particularly important for affected individuals to remain vigilant for signs of misuse of their personal information.








.webp)
.webp)
.webp)

.webp)
.webp)
.webp)
.webp)