Akira (ransomware) is a malware which emerged in March 2023.[1] It targeted over 250 entities: the government sector, businesses in Canada, US, Australia (Nissan), critical infrastructure entities (the Finnish IT services provider Tietoevry), universities (Stanford University).[2][3][4][5][6][7][8][9] Akira is offered as ransomware-as-a-service.
[10]
References
- ^ "#StopRansomware: Akira Ransomware | CISA". www.cisa.gov. April 18, 2024.
- ^ Staff, S. C. (January 22, 2024). "Akira ransomware group's changing tactics: What you need to know". SC Media.
- ^ "Akira Ransomware: Who is behind the hacker group?". May 20, 2024.
- ^ Paganini, Pierluigi (December 22, 2023). "Akira ransomware gang claims the theft of sensitive data from Nissan Australia". Security Affairs.
- ^ "Akira ransomware hits cloud service Tietoevry; numerous Swedish customers affected". therecord.media.
- ^ Paganini, Pierluigi (January 24, 2024). "Akira ransomware attack on Tietoevry disrupted the services of many Swedish organizations". Security Affairs.
- ^ Paganini, Pierluigi (April 21, 2024). "Akira ransomware received $42M in ransom payments from over 250 victims". Security Affairs.
- ^ "Stanford says data from 27,000 people leaked in September ransomware attack". therecord.media.
- ^ Sead Fadilpašić (October 14, 2024). "Veeam vulnerability exploited to deploy malware via compromised VPN credentials". TechRadar.
- ^ "Akira ransomware compromised at least 63 victims since March, report says". therecord.media.
See also