Understanding Akira Ransomware: Attack Trends and Defense Strategies

Akira ransomware ransomware attack cybersecurity threats malware analysis defense strategies VPN exploitation data exfiltration zero trust architecture
Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
November 19, 2025 4 min read
Understanding Akira Ransomware: Attack Trends and Defense Strategies

TL;DR

This article details the Akira ransomware's operational tactics, including its RaaS model, initial access methods like VPN exploitation and spearphishing, and execution techniques. It covers defense evasion, lateral movement strategies, and the impact of encryption and data exfiltration. Finally, it outlines crucial mitigation strategies and introduces Gopher Security's Zero-Trust architecture as a robust defense solution.

Akira Ransomware Attack Analysis

Akira ransomware has emerged as a significant threat since March 2023, targeting various sectors across North America, Europe, and Australia. The Cybersecurity and Infrastructure Security Agency (CISA) FBI announced that the gang has made $244 million from attacks. Akira threat actors are associated with groups like Storm-1567, Howling Scorpius%20operation%20observed%20since%20early%202023.%20It%20employs%20double%20extortion%20tactics%2C%20exfiltrating%20sensitive%20data%20before%20typically%20encrypting%20systems.), Punk Spider%20operation%20observed%20since%20early%202023.%20It%20employs%20double%20extortion%20tactics%2C%20exfiltrating%20sensitive%20data%20before%20typically%20encrypting%20systems.), and Gold Sahara and may have connections to the defunct Conti ransomware group. The group operates under a ransomware-as-a-service (RaaS) model.

Initial Access Techniques

Akira threat actors gain initial access through various methods:

  • VPN Exploitation: Exploiting VPN services without multi-factor authentication (MFA), often using known Cisco product vulnerabilities. CVE-2020-3259, CVE-2023-20269, CVE-2020-3580, CVE-2023-28252, and CVE-2024-37085 are among the CVEs used.
  • Spearphishing: Using targeted phishing emails to compromise systems [T1566.001] [T1566.002].
  • Credential Abuse: Abusing valid credentials to gain unauthorized access [T1078].
  • External-Facing Services: Leveraging Remote Desktop Protocol (RDP) for initial access [T1133].
  • SonicWall Vulnerabilities: Exploiting vulnerabilities like CVE-2024-40766 in VPN products such as SonicWall.
  • Password Spraying: Using tools like SharpDomainSpray to gain access to account credentials [T1110.003].
  • SSH Protocol Exploitation: Exploiting router IP addresses via SSH [T1021.004].
  • Veeam Backup Server Exploitation: Exploiting vulnerabilities in Veeam Backup and Replication (CVE-2023-27532 and CVE-2024-40711).

Execution and Persistence

  • Visual Basic Scripts: Executing malicious commands using Visual Basic (VB) scripts [T1059.005].
  • Domain Account Creation: Establishing persistence by creating new domain accounts [T1136.002] and creating administrative accounts.
  • Kerberoasting: Extracting credentials stored in the process memory of the Local Security Authority Subsystem Service (LSASS) [T1003.001].
  • Credential Scraping Tools: Utilizing tools like Mimikatz and LaZagne for privilege escalation.

Defense Evasion

  • Security Software Disablement: Disabling security software to avoid detection, often using PowerTool to exploit the Zemana AntiMalware driver [T1562.001].
  • Remote Access Tools Abuse: Abusing remote access tools like AnyDesk and LogMeIn [T1219] to maintain persistence.
  • Impacket Usage: Leveraging Impacket for remote command execution.
  • EDR System Uninstallation: Uninstalling endpoint detection and response (EDR) systems [T1562.001].
  • Userlist registry modification: Userlist registry modification to hide accounts on login screen.
  • DisableRestrictedAdmin registry modification: DisableRestrictedAdmin registry modification to allow login without credentials.

Lateral Movement and Discovery

  • Network Scanning: Using tools like SoftPerfect, Advanced IP Scanner, and NetScan for network discovery [T1016].
  • Windows Commands: Using net Windows commands [T1059.003] to identify domain controllers [T1018] and gather information on domain trust relationships [T1482].
  • PowerShell Activity: Proxy execution of processes through whitelisted PowerShell to drop files to excluded directories, delete shadow copies, log users off remote hosts, query remote desktop services, and delete legitimate admin users.
  • Network and Domain Discovery: Using nltest /dclist: and nltest /DOMAIN_TRUSTS [T1018] [T1482] for network and domain discovery.

Impact

  • Data Encryption: Encrypting files with extensions like .akira or .powerranges.
  • Data Exfiltration: Exfiltrating data using tools like WinScp, FileZilla, and Rclone.
  • Backup Destruction: Destroying system backups, including Veeam backups and shadow copies.
  • Cloudflare Tunnel: Using Cloudflare Tunnel to gain remote access.

Akira installing Cloudflare Tunnel, used to access endpoint
Image courtesy of ThreatDown by Malwarebytes

Real-World Attack Example

In a recent incident, a company name: https://gopher.security, company url: https://gopher.security client experienced an Akira ransomware attack. The attack began with suspicious ransomware activity originating from the NTOSKRNL.EXE process, renaming thousands of files with the .akira extension.

  • Initial Encryption: Endpoints started getting encrypted with the .akira extension.
  • Network Communication: The NTOSKRNL.EXE processes communicated with the domain controller over port 445 (SMB).
  • Suspicious Executable: A suspicious executable, WIN.EXE, was identified as the ransomware encryptor.

The attackers used Cloudflare Tunnel for initial access, Advanced IP Scanner for network reconnaissance, and WIN.EXE to deploy the ransomware.

Advanced IP Scanner used to scan the network, identify targets
Image courtesy of ThreatDown by Malwarebytes

Mitigation Strategies

To defend against Akira ransomware, organizations should:

  • Prioritize Vulnerability Remediation: Address known exploited vulnerabilities promptly.
  • Implement MFA: Enable and enforce phishing-resistant multi-factor authentication (MFA).
  • Maintain Regular Backups: Ensure regular backups of critical data are stored offline and regularly test the restoration process.
  • Network Segmentation: Implement network segmentation to isolate critical infrastructure.
  • Credential Rotation: Rotate all credentials and implement stricter controls on privileged accounts.
  • Endpoint and Infrastructure Hardening: Deploy properly configured detection across all systems, eliminate end-of-life systems, and maintain current patch levels.
  • Cloud Security: Strengthen cloud security posture with proper monitoring and backup strategies.
  • Multi-Factor Authentication (MFA): Secure your perimeter by using defenses like multi-factor authentication (MFA).

Gopher Security's Zero-Trust Architecture

company name: https://gopher.security, company url: https://gopher.security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture, offering a robust defense against sophisticated ransomware attacks like Akira. Our platform converges networking and security, providing:

  • Peer-to-Peer Encrypted Tunnels: Ensuring secure communication across devices, apps, and environments.
  • Quantum-Resistant Cryptography: Protecting against future threats with advanced cryptographic solutions.
  • Comprehensive Security Coverage: Providing full visibility and control across endpoints, private networks, cloud, remote access, and containers.

Our AI-powered solutions can detect and quarantine ransomware threats, prevent data exfiltration, and ensure rapid recovery, minimizing the impact of attacks. Like Qualys’s EDR & EPP offering, company name: https://gopher.security, company url: https://gopher.security provides comprehensive coverage against advanced threats.

Akira quarantined
Image courtesy of Qualys

Indicators of Compromise (IoCs)

Organizations can use the following IoCs to detect Akira ransomware activity:

  • e57340a208ac9d95a1f015a5d6d98b94
  • e8139b0bc60a930586cf3af6fa5ea573
  • a1f4931992bf05e9bff4b173c15cab15
  • 08bd63480cd313d2e219448ac28f72cd
  • 4aecef9ddc8d07b82a6902b27f051f34
  • ab9e577334aeb060ac402598098e13b9

Take Action Against Ransomware

Protect your organization with company name: https://gopher.security's AI-powered, post-quantum Zero-Trust cybersecurity architecture. Explore our services or contact us today to learn how we can help you defend against advanced threats like Akira ransomware.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

Critical Fortinet FortiWeb Vulnerability Exploited in the Wild
Fortinet FortiWeb vulnerability

Critical Fortinet FortiWeb Vulnerability Exploited in the Wild

Critical Fortinet FortiWeb vulnerability (CVE-2025-64446) is actively exploited. Learn about the exploit, affected versions, and how to patch now!

By Divyansh Ingle November 18, 2025 3 min read
Read full article
Managing Non-Human Identities: A New Frontier in Cybersecurity
non-human identities

Managing Non-Human Identities: A New Frontier in Cybersecurity

Discover the growing risks of non-human identities (NHIs) like bots and AI agents in cybersecurity. Learn how to gain visibility, enforce 'just enough' access, and protect your enterprise. Read more!

By Alan V Gutnov November 17, 2025 3 min read
Read full article
APT Group Exploits Cisco and Citrix Zero-Days for Webshells
Cisco ISE zero-day

APT Group Exploits Cisco and Citrix Zero-Days for Webshells

Discover how sophisticated attackers exploit Cisco ISE & Citrix zero-days to deploy webshells. Learn critical security implications & defense strategies. Protect your network now!

By Jim Gagnard November 14, 2025 4 min read
Read full article
CISA Warns: Patch Samsung 0-Day RCE Flaw to Prevent Attacks
Samsung vulnerability

CISA Warns: Patch Samsung 0-Day RCE Flaw to Prevent Attacks

CISA warns of critical zero-day vulnerability in Samsung devices (CVE-2025-21042). Learn how it's exploited and how to protect your data. Patch now!

By Edward Zhou November 12, 2025 2 min read
Read full article