'akira'
-
January 2025 marked a pivotal month in the ransomware landscape, with Akira emerging as the most active and dominant threat actor. The group was responsible for 72 attacks globally, a 60% surge compared to previous months, underscoring its aggressive expansion and technical sophistication. Akira’s rise is emblematic of the broader evolution of ransomware operations, characterized…
-
January 2025 marked a significant month in the ransomware landscape, with Akira emerging as the leading threat. According to recent reports, Akira was responsible for 72 attacks globally, highlighting its rapid rise in prominence. This surge in activity is part of a broader trend where ransomware groups are becoming increasingly sophisticated in their tactics and…
-
Akira, a Ransomware-as-a-Service (RaaS) group, has quickly become one of the most active ransomware operators in recent years. The post Akira Ransomware Adapts to Target Linux and VMware ESXi Servers appeared first on Cybersecurity News.
-
Cipla, the Indian pharmaceutical giant, has reportedly fallen victim to a cyberattack orchestrated by the Akira ransomware group. The hackers claim to have exfiltrated a staggering 70GB of sensitive data from the multinational company, which operates 47 manufacturing facilities globally and distributes its products across 86 countries.
-
The Akira ransomware took a significant leap earlier this year with the introduction of a new Rust-based variant, according to a detailed analysis from Check Point Research (CPR). This version, known as “Akira v2,” demonstrates a strategic evolution in ransomware design, targeting ESXi bare-metal hypervisor servers and leveraging the unique properties of Rust to enhance…
-
Executive Summary Emerging in early 2023, the Howling Scorpius ransomware group is the entity behind the Akira ransomware-as-a-service (RaaS), which has consistently ranked in recent months among the top five most active ransomware groups. Its double extortion strategy significantly amplifies the threat it poses. Unit 42 researchers have been monitoring the Howling Scorpius ransomware group…
-
Threat actors who compromised Great Plains’ systems between Sep. 5 and 8 were able to copy, encrypt, and exfiltrate files including individuals’ names, Social Security numbers, demographic details, driver’s license numbers, health insurance information, and diagnosis and medication details, according to the medical center, which did not name its attackers.
-
Akira ransomware group has updated its data-leak website on Nov. 13-14, listing more than 30 of its latest victims — the highest single-day total since the gang first began its malicious operations in March of last year.
-
Akira, a ransomware-as-a-service gang with a growing profile in the cybercrime underworld, has published a record number of new victims to its darknet leak site in a single day, with 35 published on Monday as of writing, and more apparently still being added.
-
Fog and Akira ransomware attacks exploit SonicWall VPN flaw CVE-2024-40766
-
At least 30 intrusions involving the exploitation of the critical SonicWall SSL VPN access control bug, tracked as CVE-2024-40766, have been conducted by the Akira and Fog ransomware gangs against several industries since August, with the former responsible for 75% of the incidents, reports BleepingComputer.
-
Hackers target VPNs primarily to exploit vulnerabilities that allow them to gain unauthorized access to enterprise networks.
-
The Akira ransomware-as-a-service group is once again exploring double extortion attack tactics after engaging in pure extortion attacks from late …
-
Cisco Talos’ recent discovery of a Rust variant of the Akira ransomware targeting ESXi servers demonstrates how quickly modern cyber threats evolve. Akira ransomware is one of the most formidable. According to their research, Its operators have continuously developed their tactics, techniques, and procedures (TTPs), solidifying their position as notorious adversaries.
-
Akira Ransomware Actors are Developing a Rust Variant to Attack ESXi servers. First identified in March 2023, it targets both Windows and Linux systems. It is first identified in March 2023, targets both “Windows” and “Linux” systems.
-
The notorious Akira ransomware group continues to adapt and refine its methods, solidifying its position as one of the most significant threats in the cyber landscape. According to a recent report from Cisco Talos, Akira’s success lies in its constant evolution and tactical shifts, as the group moves beyond traditional ransomware techniques to remain a…
-
Akira continues to cement its position as one of the most prevalent ransomware operations in the threat landscape, according to Cisco Talos’ findings and analysis.
-
Oct 14, 2024Ravie LakshmananRansomware / Vulnerability