Original Article Text

Click to Toggle View

FBI: Akira ransomware raked in $42 million from 250+ victims. ​The Akira ransomware operation has breached the networks of over 250 organizations and raked in roughly $42 million in ransom payments. ​Akira emerged in March 2023 and quickly gained notoriety after targeting victims across various industry verticals worldwide. By June 2023, the group's ransomware developers had created and deployed a Linux encryptor to target VMware ESXi virtual machines widely used in enterprise organizations. According to negotiation chats obtained by BleepingComputer, Akira operators are demanding ransoms ranging from $200,000 to millions of dollars, depending on the size of the compromised organization. "As of January 1, 2024, the ransomware group has impacted over 250 organizations and claimed approximately $42 million (USD) in ransomware proceeds," according to a joint advisory issued by the FBI, CISA, Europol's European Cybercrime Centre (EC3), and the Netherlands' National Cyber Security Centre (NCSC-NL). "Since March 2023, Akira ransomware has impacted a wide range of businesses and critical infrastructure entities in North America, Europe, and Australia." Most recently, Akira has claimed ransomware attacks on Nissan Oceania, which warned of a data breach impacting 100,000 people in March, and Stanford University, which also revealed last month a breach affecting the personal information of 27,000 individuals. Since it surfaced last year, the ransomware group has added over 230 organizations to its dark web leak website. ​Today's advisory also offers guidance on reducing the impact and risks linked to this ransomware gang's attacks. Network defenders are strongly advised to prioritize patching vulnerabilities that have already been exploited and enforce multifactor authentication (MFA) with strong passwords across all services, especially for webmail, VPN, and accounts linked to critical systems. Additionally, they should regularly update and patch software to the latest versions and focus on vulnerability assessments as integral components of their standard security protocols. The four agencies also provide Akira indicators of compromise (IOCs) and information on tactics, techniques, and procedures (TTPs) identified during FBI investigations as recently as February 2024. "The FBI, CISA, EC3, and NCSC-NL encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents," they urged on Thursday.

Daily Brief Summary

RANSOMWARE // Akira Ransomware Amasses $42 Million from Global Victims

The Akira ransomware group has attacked over 250 organizations globally since March 2023, generating around $42 million in ransoms.

Victims span various industries and include significant entities like Nissan Oceania and Stanford University, impacting hundreds of thousands of individuals.

Akira has utilized a Linux encryptor targeting VMware ESXi virtual machines, popular in enterprise environments.

Ransom demands by Akira range from $200,000 to several million dollars, based on the size and type of the compromised organization.

Authorities including the FBI, CISA, Europol's EC3, and NCSC-NL have jointly issued advisories and provided mitigation strategies to combat this threat.

Recommendations for organizations include prioritizing patching known vulnerabilities, enforcing strong multifactor authentication, and conducting regular software updates and vulnerability assessments.

The advisory also includes Akira-specific indicators of compromise and details on their tactics, urging organizations to follow the provided guidelines to reduce ransomware risks.