Akira Ransomware Group Report

Download Report

Emerging in March 2023, the Akira ransomware group has rapidly become a significant player in the realm of cybercrime. With a primary focus on financial gain, Akira has targeted organizations across the United States and Canada, particularly within critical sectors such as healthcare, finance, education, and manufacturing. Their strategic targeting of financial institutions and government-related organizations underscores the calculated approach of their operations, including attacks on critical infrastructure in countries like Ecuador.

Akira’s tactics revolve around double-extortion ransomware methods—encrypting victims’ data while exfiltrating sensitive information. The group demands hefty ransoms, ranging from $200,000 to $4 million, in exchange for decrypting files or refraining from publishing stolen data. Notably, the ransomware has evolved over time, transitioning from a C++-based architecture to one built with Rust, indicating a continuous effort to enhance its capabilities and evade detection.

Through relentless campaigns, including expansion into VMware ESXi environments in April 2023, Akira has compromised over 250 organizations worldwide. The group’s impact is global, affecting industries such as healthcare, legal, manufacturing, and critical infrastructure. Their activity, which intensified throughout 2024, highlights the ongoing threat posed by this sophisticated adversary.

Relevant Reports

We see the full picture of the evolving cyber threat landscape thanks to unique tools for monitoring the infrastructure used by cybercriminals and data from battlefields: