Akira

Akira Ransomware Group is known for its "retro aesthetic" and for primarily exploiting vulnerabilities in VPN services and known Cisco vulnerabilities.

Is Your Organization Safe from Akira Ransomware Attacks?

The origin of Akira ransomware

The Akira ransomware group, first observed in 2023, is known for its sophisticated ransomware attacks targeting various industries worldwide. This group operates under a Ransomware-as-a-Service (RaaS) model, enabling affiliates to use the ransomware in exchange for a share of the ransom payments. Akira's origin remains unclear, but its activities suggest a high level of technical expertise and organization.

Cartography: OCD

Targets

Akira ransomware's targets

Countries targeted by Akira

Akira has shown a global reach, with confirmed attacks in North America, Europe, and Asia. Their indiscriminate targeting pattern suggests a focus on exploiting vulnerable systems regardless of geographic location.

Image source: SOCradar

Industries targeted by Akira

Akira ransomware has targeted a wide range of industries, including healthcare, financial services, education, and manufacturing. Their attacks have disrupted critical services and operations, causing significant financial and reputational damage to the affected organizations.

Screenshot source: Cyble

Industries targeted by Akira

Akira ransomware has targeted a wide range of industries, including healthcare, financial services, education, and manufacturing. Their attacks have disrupted critical services and operations, causing significant financial and reputational damage to the affected organizations.

Screenshot source: Cyble

Akira's victims

More than 282 victims have been targeted by Akira. Notable victims include major healthcare institutions, leading universities, and prominent financial firms. These attacks often result in the exfiltration of sensitive data, which is then used to pressure victims into paying the ransom.

Source: ransomware.live

Attack Method

Akira's Attack Method

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.

Akira typically gains initial access through phishing emails, exploiting vulnerabilities in public-facing applications, or leveraging compromised credentials. They often use spear-phishing to target specific individuals within organizations.

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.

Once inside the network, Akira uses various techniques to escalate privileges, such as exploiting known vulnerabilities and using legitimate administrative tools to gain higher-level access.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.

To avoid detection, Akira employs sophisticated evasion techniques, including disabling security software, using obfuscation, and deleting logs to cover their tracks.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.

Akira collects credentials through keylogging, credential dumping, and using tools like Mimikatz to harvest passwords from infected systems.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.

The group conducts thorough reconnaissance to map out the network, identify critical assets, and understand the organization's structure. They use tools such as PowerShell and custom scripts for this purpose.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.

Akira moves laterally across the network using compromised credentials, exploiting trust relationships, and using tools like RDP and SMB to propagate.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.

Data collection involves gathering sensitive information, intellectual property, and personal data, which is then exfiltrated for extortion purposes.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.

The ransomware payload is executed, encrypting files on the victim's systems. Akira uses robust encryption algorithms to ensure files cannot be recovered without the decryption key.

A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.

Before encryption, Akira exfiltrates sensitive data to external servers under their control, leveraging encrypted communication channels to avoid detection.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.

The impact phase involves the finalization of encryption and the delivery of the ransom note, which demands payment in exchange for the decryption key and the promise to delete the exfiltrated data.

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.
Initial Access

Akira typically gains initial access through phishing emails, exploiting vulnerabilities in public-facing applications, or leveraging compromised credentials. They often use spear-phishing to target specific individuals within organizations.

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.
Privilege Escalation

Once inside the network, Akira uses various techniques to escalate privileges, such as exploiting known vulnerabilities and using legitimate administrative tools to gain higher-level access.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.
Defense Evasion

To avoid detection, Akira employs sophisticated evasion techniques, including disabling security software, using obfuscation, and deleting logs to cover their tracks.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.
Credential Access

Akira collects credentials through keylogging, credential dumping, and using tools like Mimikatz to harvest passwords from infected systems.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.
Discovery

The group conducts thorough reconnaissance to map out the network, identify critical assets, and understand the organization's structure. They use tools such as PowerShell and custom scripts for this purpose.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.
Lateral Movement

Akira moves laterally across the network using compromised credentials, exploiting trust relationships, and using tools like RDP and SMB to propagate.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.
Collection

Data collection involves gathering sensitive information, intellectual property, and personal data, which is then exfiltrated for extortion purposes.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.
Execution

The ransomware payload is executed, encrypting files on the victim's systems. Akira uses robust encryption algorithms to ensure files cannot be recovered without the decryption key.

A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.
Exfiltration

Before encryption, Akira exfiltrates sensitive data to external servers under their control, leveraging encrypted communication channels to avoid detection.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.
Impact

The impact phase involves the finalization of encryption and the delivery of the ransom note, which demands payment in exchange for the decryption key and the promise to delete the exfiltrated data.

MITRE ATT&CK Mapping

TTPs used by Akira

TA0001: Initial Access
T1566
Phishing
T1190
Exploit Public-Facing Application
T1133
External Remote Services
T1078
Valid Accounts
TA0002: Execution
No items found.
TA0003: Persistence
T1136
Create Account
T1078
Valid Accounts
TA0004: Privilege Escalation
T1078
Valid Accounts
TA0005: Defense Evasion
T1562
Impair Defenses
T1078
Valid Accounts
TA0006: Credential Access
T1003
OS Credential Dumping
TA0007: Discovery
T1482
Domain Trust Discovery
T1082
System Information Discovery
T1069
Permission Groups Discovery
T1057
Process Discovery
T1016
System Network Configuration Discovery
T1018
Remote System Discovery
TA0008: Lateral Movement
No items found.
TA0009: Collection
T1560
Archive Collected Data
TA0011: Command and Control
T1219
Remote Access Software
T1090
Proxy
TA0010: Exfiltration
T1567
Exfiltration Over Web Service
T1537
Transfer Data to Cloud Account
T1048
Exfiltration Over Alternative Protocol
TA0040: Impact
T1490
Inhibit System Recovery
T1657
Financial Theft
T1486
Data Encrypted for Impact
Platform Detections

How to Detect Akira with Vectra AI

List of the Detections available in the Vectra AI Platform that would indicate a ransomware attack.

FAQs

What is Akira ransomware?

Akira ransomware is a sophisticated malware used by cybercriminals to encrypt files and extort victims for ransom payments.

How does Akira gain access to networks?

Akira gains initial access through phishing emails, exploiting vulnerabilities, and using compromised credentials.

What industries does Akira target?

Akira targets a wide range of industries, including healthcare, financial services, education, and manufacturing.

What techniques does Akira use to evade detection?

Akira uses techniques such as disabling security software, obfuscation, and log deletion to evade detection.

How does Akira escalate privileges within a network?

Akira exploits known vulnerabilities and uses legitimate administrative tools to gain higher-level access.

What kind of data does Akira exfiltrate?

Akira exfiltrates sensitive information, intellectual property, and personal data before encrypting files.

How does Akira encrypt files?

Akira uses robust encryption algorithms to ensure files cannot be recovered without the decryption key.

What is the impact of an Akira ransomware attack?

The impact includes data encryption, service disruption, and financial loss due to ransom payments and recovery efforts.

Can Akira ransomware be detected and stopped?

Detection and prevention require robust security measures, including extended detection and response (XDR) solutions, regular software updates, and employee training.

What should organizations do if they are infected by Akira ransomware?

Organizations should disconnect affected systems, report the incident to authorities, and seek professional cybersecurity assistance to mitigate the damage and recover data.