Akira (ransomware) explained

Akira (ransomware) is a malware which emerged in March 2023.[1] It targeted over 250 entities: the government sector, businesses in Canada, US, Australia (Nissan), critical infrastructure entities (the Finnish IT services provider Tietoevry), universities (Stanford University).[2] [3] [4] [5] [6] [7] [8] [9] Akira is offered as ransomware-as-a-service. [10]

See also

Notes and References

  1. Web site:
    1. StopRansomware: Akira Ransomware | CISA
    . April 18, 2024. www.cisa.gov.
  2. Web site: Akira ransomware group's changing tactics: What you need to know. S. C.. Staff. January 22, 2024. SC Media.
  3. Web site: Akira Ransomware: Who is behind the hacker group?. May 20, 2024.
  4. Web site: Akira ransomware gang claims the theft of sensitive data from Nissan Australia. Pierluigi. Paganini. December 22, 2023. Security Affairs.
  5. Web site: Akira ransomware hits cloud service Tietoevry; numerous Swedish customers affected. therecord.media.
  6. Web site: Akira ransomware attack on Tietoevry disrupted the services of many Swedish organizations. Pierluigi. Paganini. January 24, 2024. Security Affairs.
  7. Web site: Akira ransomware received $42M in ransom payments from over 250 victims. Pierluigi. Paganini. April 21, 2024. Security Affairs.
  8. Web site: Stanford says data from 27,000 people leaked in September ransomware attack. therecord.media.
  9. Web site: Veeam vulnerability exploited to deploy malware via compromised VPN credentials. Sead Fadilpašić. October 14, 2024. TechRadar.
  10. Web site: Akira ransomware compromised at least 63 victims since March, report says. therecord.media.