THREAT ACTOR

Akira

7.7
THREAT LEVEL
EMERGENCE DATE
Mar 2023
CATEGORY
Ransomware-as-a-Service
AFFILIATIONS

Potential connections with former Conti group based on cryptocurrency analysis and code similarities. Operates independently with skilled affiliates.

DEscription

Emerging in March 2023, Akira rapidly established itself as a dominant Ransomware-as-a-Service (RaaS) operation through encryption techniques and multi-platform targeting capabilities. The group employs double extortion tactics, encrypting victim data while threatening public exposure, with ransom demands ranging from hundreds of thousands to several million dollars. Operating across North America, Europe, and Australia, the ransomware maintains a strong focus on organizations with critical data dependencies and operational vulnerabilities.

CRITICALITY
Assesses the importance of the potential target, including their size/scale, data's value, and operational impact.
lethality
Evaluates the potential for damage from the attack, including the ability to disrupt operations, and cause financial loss, damage public brand image.
AGGRESSIVENESS
Assesses the psychological and tactical intensity of the group’s behavior, including targeted harassment, violent language, blackmail, and political motives.

Classifications & Affiliations

Type: Ransomware-as-a-Service (RaaS)

Operating through a mature affiliate model, Akira provides encryption tools and infrastructure while affiliates execute attacks. Technical analysis reveals shared cryptocurrency wallets and code similarities with the former Conti operation, though definitive organizational links remain unestablished. The group shows capabilities characteristic of experienced ransomware operators, utilizing proven methodologies while introducing innovative techniques.

Current Status: Active as of September 2025

Threat Level:
7.7

Origins and Methodology

Leveraging cross-platform capabilities and encryption methods, this threat actor targets high-value sectors with calculated precision. The group's multi-vector approach combines technical exploitation with social engineering, reflecting deep understanding of enterprise security architectures.

Strategic targeting focuses on organizations where operational disruption creates maximum leverage for ransom negotiations. The operation currently ranks as one of the leading ransomware families in insurance claims, maintaining consistent top-tier positioning despite brief operational fluctuations.

What is the Evolution of Akira Ransomware?
0.1
Formation

Initially targeting Windows systems with C-based ransomware, the group quickly expanded to encompass Linux and VMware ESXi environments. The August 2023 introduction of a Rust-based Megazord variant enhanced Linux compatibility and virtualization targeting.

0.2
EVOLUTION

The group's technical journey shows pragmatic adaptation, transitioning between C, Rust, and back to optimized C implementations as operational needs evolved. Latest variants employ ChaCha8 encryption for enhanced performance while maintaining cross-platform effectiveness. This continuous refinement of encryption methods, combined with rapid vulnerability exploitation, characterizes their technical progression.

0.3
Lineage/Connections

Cryptocurrency transaction patterns and code analysis suggest connections to former Conti operations, though Akira maintains independent infrastructure and distinctive tactical approaches.

Which Unique Techniques Does Akira Use?

The group's technical arsenal reflects mature operational capabilities, combining established methodologies with innovative approaches tailored to modern enterprise environments.

TECHNIQUE

DETAILS

Infection Vectors

Primary access occurs through compromised VPN credentials, spear-phishing campaigns with malicious attachments, and exploitation of vulnerabilities in Cisco ASA, FortiClient, and SonicWall systems. Capable of bypassing MFA in certain configurations by exploiting implementation weaknesses or misconfigurations.

Target Selection

Focuses on healthcare, finance, education, and manufacturing sectors. Geographic presence includes North America, Europe, Australia, with growing activity in South America and Asia. Targets organizations with high data sensitivity, operational dependencies, or regulatory pressure.

Operational Complexity

Employs multi-stage campaigns with RDP, SMB, and PsExec for lateral movement. Domain controllers are prioritized for escalation. Uses Living-off-the-Land Binaries (LOLBins), disables security tools, and clears logs. Deployment varies by platform (Windows, Linux, ESXi), with advanced use of ChaCha20, ChaCha8, and RSA4096 encryption in optimized routines.

Key Features & Technical Details

The Akira ransomware exemplifies hybrid encryption combined with multi-platform adaptability, primarily through ChaCha20 and RSA algorithms for enhanced security. With the integration of a Rust-based Linux variant.

FEATURE

DETAILS

Encryption Method

Hybrid encryption combining ChaCha20/ChaCha8 with RSA4096. ChaCha8 is used for enhanced performance on ESXi.

File Extension

.akira, .powerranges, .akiranew

Ransom Note

Victim-specific codes directing to TOR-based negotiation portals with interactive chat functionality

Double Extortion

Data exfiltration using FileZilla, WinRAR, and RClone before encryption deployment

Communication Channels

TOR hidden services and AnyDesk relay connections for attacker access

Deployment Speed

Rapid network-wide encryption typically completed within 24–48 hours

Payment Method

Bitcoin only, with structured payment schedules

Operational Model

Mature RaaS affiliate program with revenue sharing

Activities

Akira's sustained operational tempo has resulted in numerous confirmed attacks through 2024, with continued high activity levels into 2025. The group ranks among the top ransomware families in global insurance claims by Q2 2025, demonstrating exceptional market penetration and operational consistency.

Which Industries Are Most Vulnerable to Akira?

Manufacturing, business services, and construction sectors experience the highest incident rates, followed by retail, technology, education, and finance. Healthcare organizations face particular risk due to critical data dependencies and regulatory compliance pressures. The group increasingly targets mid-sized government and municipal organizations, exploiting budget constraints and legacy infrastructure vulnerabilities. These sectors prove attractive due to operational continuity requirements, limited security budgets, and critical data dependencies that increase likelihood of ransom payment.

Modus Operandi

This threat actor employs a comprehensive attack methodology leveraging both technical exploitation and human factors to achieve persistent access and maximum impact.

Details

Akira gains entry through compromised VPN credentials obtained via spear-phishing campaigns and direct exploitation of Cisco ASA, FortiClient, and SonicWall vulnerabilities (T1190, T1133, T1566.001, T1078). Initial Access Brokers frequently provide entry points, with credentials purchased and exploited within days of availability.

Techniques target Cisco firewall implementations where firewall PINs lack MFA or rely on push MFA configurations. VPN remote access exploitation remains a primary vector when MFA is absent or misconfigured.

Details

Upon gaining access, ShareFinder.ps1 scripts automatically map network shares and enumerate valuable data repositories.

Extensive reconnaissance utilizes native Windows commands and PowerShell scripts to identify high-value targets and locate backup systems (T1057, T1087, T1083). Advanced IP Scanner, Masscan, ReconFTW, SharpHound, SoftPerfect NetScan, and Impacket tools enable comprehensive network mapping and domain structure enumeration.

Details

AnyDesk serves as the primary tool for persistent remote access, with redundant connections established through compromised infrastructure. The arsenal includes ScreenConnect, TeamViewer variants, MobaXterm, Radmin, and RustDesk to maintain operational flexibility and evade detection (T1219).

Details

Defense strategies systematically disable antivirus solutions and clear event logs while employing PowerShell obfuscation techniques. EDR bypass methods leverage unconventional approaches including webcam exploitation (T1562.001, T1070.001, T1140). VMware vCenter exploits and Cisco firewall vulnerabilities provide additional evasion capabilities.

The toolkit includes PowerTool, Zemana Anti-Rootkit driver, and KillAV for security bypass, while Ngrok and Ngroki.jio serve as proxy services to mask malicious traffic.

Details

Mimikatz deployment enables systematic credential harvesting from LSASS process memory, supplemented by keylogging for real-time capture. The group targets stored credentials in browsers and password managers (T1003, T1555, T1056.001). DonPAPI and LaZagne automate credential extraction, while Impacket utilities specifically target cached domain credentials.

Details

C2 infrastructure operates through TOR hidden services and compromised legitimate websites to avoid detection. Communication channels employ encrypted protocols and domain fronting techniques for resilient connectivity (T1071, T1090, T1573).

Details

Network traversal leverages RDP, SMB, and PsExec with particular focus on domain controllers for privilege escalation. WMI and PowerShell remoting enable stealthy movement across systems (T1021, T1047, T1059.001). Impacket's psexec.py facilitates remote execution, while attackers specifically target network attached storage and ESXi environments through SSH. RDP to domain controllers provides rapid administrative access across the environment.

Details

Data staging utilizes WinRAR for compression before transfer via FileZilla and RClone to attacker-controlled infrastructure. Extended exfiltration periods help avoid detection (T1048, T1041, T1567).

Mega cloud storage, Temp[.]sh, and WinSCP provide additional exfiltration channels. Scattered Spider affiliates specifically exploit Veeam infrastructure when available for rapid data theft.

Details

The group creates domain accounts with elevated privileges and deploys scheduled tasks across critical infrastructure. Registry key modifications ensure automatic execution upon system restart (T1136.002, T1053, T1547.001).

Details

Operations achieve comprehensive business disruption through encryption of critical systems and backup destruction. Recovery timelines typically extend weeks or months due to the thoroughness of the attack (T1486, T1490, T1485).

Details

Ransomware deployment features multi-threaded encryption utilizing ChaCha20/ChaCha8 algorithms for maximum speed. Platform-specific variants target Windows, Linux, and ESXi systems (T1486). RMM tools facilitate widespread deployment, with specialized routines to encrypt both ESXi and Linux systems simultaneously.

Details

The double extortion model combines data encryption with publication threats on dedicated leak sites. Ransom demands range from hundreds of thousands to several million dollars, with negotiations conducted exclusively through TOR-based portals.

Details

Forensic artifacts are systematically removed while logs are cleared and volume shadow copies deleted to prevent recovery. Timestamp manipulation and tool removal eliminate evidence trails (T1070, T1490).

Anti-forensic tooling ensures comprehensive cleanup, with shadow copy deletion preventing file restoration. Scattered Spider affiliates demonstrate particular destructiveness, ensuring complete backup deletion to maximize impact.

Indicators of Compromise (IOCs)

FEATURE

DETAILS

Encryption Method

Hybrid encryption combining ChaCha20/ChaCha8 with RSA4096. ChaCha8 is used for enhanced performance on ESXi.

File Extension

.akira, .powerranges, .akiranew

Ransom Note

Victim-specific codes directing to TOR-based negotiation portals with interactive chat functionality

Double Extortion

Data exfiltration using FileZilla, WinRAR, and RClone before encryption deployment

Communication Channels

TOR hidden services and AnyDesk relay connections for attacker access

Deployment Speed

Rapid network-wide encryption typically completed within 24–48 hours

Killswitch

No known killswitch mechanism

Payment Method

Bitcoin only, with structured payment schedules

Operational Model

Mature RaaS affiliate program with revenue sharing

Exploits and Vulnerabilities

EXPLOITS AND VULNERABILITIES

CVE

CVSS

DESCRIPTION

Cisco IOS XE Web UI

CVE-2023-20269

9.1

Authentication bypass allowing unauthorized network access

SonicWall SonicOS

CVE-2024-40766

9.3

Improper access control exploited for initial compromise

Veeam Backup

CVE-2024-40711

9.8

.NET deserialization flaw enabling privilege escalation

VMware ESXi

CVE-2024-37085

8.8

Authentication bypass in ESXi management interface