Saturday, February 22, 2025
Homecyber securityAkira Ransomware Attacks Over 250 Organizations and Collects $42 Million

Akira Ransomware Attacks Over 250 Organizations and Collects $42 Million

Published on

SIEM as a Service

Follow Us on Google News

The Akira ransomware variant has severely impacted more than 250 organizations worldwide, amassing approximately USD 42 million in ransom payments.

This information comes from a detailed joint Cybersecurity Advisory issued by the FBI and the Cybersecurity and Infrastructure Security Agency (CISA).

Evolution of Akira Ransomware

Initially detected in early versions written in C++, the Akira ransomware encrypted victims’ files, appending them with a .akira extension.

However, a significant shift occurred in August 2023 when the ransomware operators began deploying a new variant named Megazord.

This updated version, crafted in Rust, marks encrypted files with a .powerranges extension, indicating a strategic evolution in the malware’s development to evade detection and potentially enhance its encryption capabilities.

Free Webinar | Mastering WAAP/WAF ROI Analysis | Book Your Spot

The advisory highlights the extensive reach of the Akira ransomware, noting its profound impact on over 250 organizations.

The financial repercussions are staggering, with the cybercriminals behind these attacks having extracted roughly $42 million USD in ransoms.

The scale and sophistication of the operations suggest a highly organized criminal network with significant resources.

Akira threat actors use tools like FileZilla, WinSCP, WinRAR, and RClone to extract data from a system.

Threat actors use easily accessible tools such as AnyDesk, MobaXterm, RustDesk, Ngrok, and Cloudflare Tunnel to establish command and control channels.

This allows them to exfiltrate data through different protocols like FTP, SFTP, and cloud storage services like Mega. They then connect to exfiltration servers to transfer the data.

Tools Abused

Tool NamePurposeDescription of Use
PowerShellScriptingUsed to automate tasks and manage configurations, often for initial access and movement.
MimikatzCredential HarvestingEmployed to steal credentials, which are crucial for lateral movement within a network.
Cobalt StrikeCommand and ControlA legitimate security tool repurposed to control compromised systems remotely.
PsExecRemote ExecutionUtilized to execute processes on other systems, aiding in the spread of ransomware.
RcloneData ExfiltrationCommand-line program to manage files on cloud storage, used to exfiltrate data.
Advanced IP ScannerNetwork ScanningScans network devices, providing information that can be used to further infiltrate networks.

These tools represent a combination of legitimate software repurposed for malicious intent and specific hacking tools designed for cyber espionage and system manipulation.

The use of such tools in the Akira ransomware attacks highlights the sophistication and the level of access achieved by the attackers.

FBI and CISA Response

In response to the rising threat, the FBI and CISA have intensified their efforts to combat the spread of Akira ransomware. They urge affected organizations to report incidents to local FBI field offices or directly to CISA’s 24/7 Operations Center.

The advisory also provides detailed indicators of compromise, including malicious file hashes, which network defenders are encouraged to use to identify and mitigate potential ransomware attacks.

Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...