Akira (ransomware) explained
Akira (ransomware) is a malware which emerged in March 2023.[1] It targeted over 250 entities: the government sector, businesses in Canada, US, Australia (Nissan), critical infrastructure entities (the Finnish IT services provider Tietoevry), universities (Stanford University).[2] [3] [4] [5] [6] [7] [8] [9] Akira is offered as ransomware-as-a-service. [10]
See also
Notes and References
- Web site:
- StopRansomware: Akira Ransomware | CISA
. April 18, 2024. www.cisa.gov.
- Web site: Akira ransomware group's changing tactics: What you need to know. S. C.. Staff. January 22, 2024. SC Media.
- Web site: Akira Ransomware: Who is behind the hacker group?. May 20, 2024.
- Web site: Akira ransomware gang claims the theft of sensitive data from Nissan Australia. Pierluigi. Paganini. December 22, 2023. Security Affairs.
- Web site: Akira ransomware hits cloud service Tietoevry; numerous Swedish customers affected. therecord.media.
- Web site: Akira ransomware attack on Tietoevry disrupted the services of many Swedish organizations. Pierluigi. Paganini. January 24, 2024. Security Affairs.
- Web site: Akira ransomware received $42M in ransom payments from over 250 victims. Pierluigi. Paganini. April 21, 2024. Security Affairs.
- Web site: Stanford says data from 27,000 people leaked in September ransomware attack. therecord.media.
- Web site: Veeam vulnerability exploited to deploy malware via compromised VPN credentials. Sead Fadilpašić. October 14, 2024. TechRadar.
- Web site: Akira ransomware compromised at least 63 victims since March, report says. therecord.media.