Akira Ransomware Group

Actor Type Criminal Group

The Akira Ransomware Group is responsible for the Akira ransomware and associated (1980s themed) leaks site. According to reporting, Akira operates a ransomware-as-a-service model with associated attacks utilising double extortion (with encryption and threat of data leaking). The group offers affiliates a comprehensive arsenal capable of encrypting Linux and VMWare ESXi hosts as well as windows machines. The group has also been reported as targeting VPN devices which lack multifactor authentication (MFA).

Analysis by security researchers suggests that the group may have links to Conti based on code similarities (such as ignored files and ChaCha encryption algorithm implementation) and blockchain analysis.

According to CISA, as of January 2024, the group had impacted over 250 organizations and claimed approximately $42 million (USD) in ransom payments. Victim organizations span different sectors globally but the majority appear to be based in the US with manufacturing, education, finance and government particularly badly affected.

Cyber Threat Graph Context

Explore how this Intrusion Set relates to the wider threat graph

Akira Ransomware Group Threat Reports

Report

AA24-109A StopRansomware: Akira Ransomware

This is a joint #StopRansomware advisory issued by CISA and partners covering Akira ransomware attacks. According to the report, the group has ...

References

MITRE ATT&CK Techniques

MITRE ATT&CK techniques observed in use by this intrusion set.

ATT&CK ID Title Associated Tactics
T1190 Exploit Public-Facing Application Initial Access
T1057 Process Discovery Discovery
T1136.002 Domain Account Persistence
T1560.001 Archive via Utility Collection
T1090 Proxy Command and Control
T1567.002 Exfiltration to Cloud Storage Exfiltration
T1048 Exfiltration Over Alternative Protocol Exfiltration
T1003.001 LSASS Memory Credential Access
T1078 Valid Accounts Defense Evasion, Initial Access, Persistence, Privilege Escalation
T1016 System Network Configuration Discovery Discovery
T1566.001 Spearphishing Attachment Initial Access
T1069.001 Local Groups Discovery
T1069.002 Domain Groups Discovery
T1219 Remote Access Software Command and Control
T1486 Data Encrypted for Impact Impact
T1537 Transfer Data to Cloud Account Exfiltration
T1562.001 Disable or Modify Tools Defense Evasion
T1482 Domain Trust Discovery Discovery
T1133 External Remote Services Initial Access, Persistence
T1003 OS Credential Dumping Credential Access
T1082 System Information Discovery Discovery
T1018 Remote System Discovery Discovery
T1657 Financial Theft Impact
T1490 Inhibit System Recovery Impact
T1566.002 Spearphishing Link Initial Access