Ransomware gang says it hacked US defense contractor BK Technologies

A ransomware group called Akira today took credit for a September 2025 data breach at BK Technologies, a manufacturer of wireless communication devices for police, military, and government agencies.

BK Technologies confirmed an unauthorized party accessed its systems on September 20, 2025, according to an October 6 SEC report.

Akira says it stole 25 GB of data from BK technologies, including employee info, accounting documents, confidential agreements, military contracts, NDAs, and payment info.

Akira lists BK Technologies on its data leak site.
Akira lists BK Technologies on its data leak site.

BK Technologies has not verified Akira’s claim. We do not know what data was compromised, how attackers breached BK Technologies’ network, if the company did or will pay a ransom, or how much Akira demanded. Comparitech contacted BK Technologies for comment and will update this article if it replies.

“As a result of the incident, a limited number of non-critical systems experienced minor disruption. However, through the Company’s remediation efforts, the Company believes that the third party responsible for this incident has been removed from the Company’s IT systems, and the Company’s ability to access information impacted by this incident has been restored,” says BK Technologies’ SEC report.

“As part of the Company’s investigation into this incident, it appears that an unauthorized third-party may have obtained access to and acquired non-public information within the Company’s custody and control, which potentially includes records pertaining to current and former employees.”

Who is Akira?

Akira is a ransomware gang that first emerged in March 2023. Its targets span education, finance, manufacturing, real estate, and healthcare. Akira’s malware both locks down computer systems and steals data. The group then demands a ransom to restore those systems and secure stolen data.

Akira has claimed responsibility for 559 ransomware attacks, 55 of which have been publicly acknowledged by the targeted organizations. 13 of those confirmed attacks hit manufacturers, including Tenryu America and Bugnard. Bugnard reportedly paid $200,000 in ransom after negotiating down Akira’s $450,000 demand.

Ransomware attacks on US manufacturers

Comparitech researchers have logged 50 confirmed ransomware attacks on US manufacturers in 2025 to date, plus 531 attack claims made by ransomware gangs that weren’t publicly acknowledged by the targeted organizations.

DALB, Inc, a screen printer in West Virginia, recently notified 846 people of a data breach for which Akira also took credit.

Earlier this month, Jewett-Cameron Trading Co. reported a ransomware attack hit its systems. No ransomware group has claimed that attack as of time of writing.

Ransomware attacks on manufacturers can lock down computer systems and steal data. Successful infections can disrupt billing, communications, orders, shipments, and in some cases manufacturing equipment and processes. The attackers demand a ransom to restore infected systems and delete stolen data. If manufacturers refuse to pay up, they face extended downtime, permanent data loss, unauthorized data disclosure, and putting data subjects at increased risk of fraud.

About BK Technologies

BK Technologies ($BKTI) is a wireless equipment maker based in West Melbourne, Florida. It manufactures and sells telecommunication devices–namely walkie-talkies–for police, military, and government agencies. On its website, the company lists the US Departments of Defense, Homeland Security, Agriculture, and the Interior among its clients, as well as the US Army National Guard and the California Department of Forestry & Fire Protection.