Akira and Cl0p Lead Most Active Ransomware-as-a-Service Groups in 2025
Summary
Hide ▲
Show ▼
The first half of 2025 saw a 179% increase in ransomware attacks compared to the same period in 2024, with Akira and Cl0p remaining the most active ransomware-as-a-service (RaaS) groups. Akira’s operational tempo has accelerated dramatically, with threat actors now completing attack lifecycles in under four hours and, in some cases, less than one hour. The group leverages vulnerabilities in VPN appliances and backup solutions—particularly SonicWall, Veeam, and Cisco devices lacking multi-factor authentication (MFA)—as well as credential theft, spearphishing, and initial access brokers (IABs) for initial access. Akira employs double-extortion tactics, exfiltrating data prior to encryption while evading detection through disabling security software and using living-off-the-land tools. The group’s rapid compromise capabilities, disciplined operational tempo, and hybrid encryption schemes enable maximum impact in minimal time, contributing to its sustained profitability with illicit proceeds estimated at $244.17m since March 2023. Akira has also expanded its targeting to Nutanix AHV virtual machines, further diversifying its attack surface. Akira’s activity has consistently targeted manufacturing and technology sectors, with the US being the most affected region. The RaaS model has enabled lower-skilled actors to participate, amplifying the surge in ransomware incidents. New tactics include pure extortion without encryption, AI-assisted phishing, and exploitation of vulnerabilities such as CVE-2024-40766 in SonicWall devices. The Australian Cyber Security Centre (ACSC) has acknowledged Akira’s targeting of Australian organizations through SonicWall devices, while incomplete remediation of CVE-2024-40766 has fueled renewed exploitation. Akira’s dwell times are among the shortest recorded for ransomware, often measured in hours, and the group has demonstrated significant evolution in its tactics, including encrypting Nutanix AHV virtual machine disk files and leveraging tools like Ngrok for encrypted command-and-control channels. Akira’s ransomware proceeds since late September 2025 exceed $244m, underscoring the group’s operational sophistication and financial impact.
Timeline
-
14.11.2025 00:32 2 articles · 4mo ago
Akira Expands to Target Nutanix AHV Virtual Machines
In June 2025, Akira ransomware expanded its encryption capabilities to target Nutanix AHV virtual machines, encrypting .qcow2 disk files. Akira threat actors have been observed using utilities such as nltest, AnyDesk, LogMeIn, Impacket's wmiexec.py, and VB scripts for reconnaissance, lateral movement, and persistence. Akira has exfiltrated data in as little as two hours during some attacks. Akira has used tunneling tools such as Ngrok to establish encrypted command-and-control channels. Akira has exploited CVE-2023-27532 and CVE-2024-40711 vulnerabilities on unpatched Veeam Backup & Replication servers to gain access and delete backups. Akira has been observed copying VMDK files from domain controller VMs to extract NTDS.dit files and SYSTEM hives for domain administrator access. Akira ransomware operators use sophisticated hybrid encryption schemes to lock data, appending encrypted files with extensions such as .akira, .powerranges, .akiranew, or .aki. A ransom note named fn.txt or akira_readme.txt appears in both the root directory (C:) and each user’s home directory (C:\Users).
Show sources
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
11.09.2025 13:33 7 articles · 6mo ago
Akira Exploits SonicWall Vulnerabilities and Misconfigurations
Security researchers at Halcyon reported that Akira ransomware has demonstrated the capability to complete an entire attack lifecycle in less than four hours, with some incidents occurring in under one hour without detection. This development highlights Akira’s continued reliance on vulnerabilities in VPN appliances and backup solutions—particularly SonicWall devices lacking multi-factor authentication (MFA)—as well as credential theft and initial access brokers for initial access. The group’s operational tempo and stealthy tactics, including disabling security software and using living-off-the-land tools, further underscore its adaptability and sophistication in evading detection.
Show sources
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
- Half of Ransomware Access Due to Hijacked VPN Credentials — www.infosecurity-magazine.com — 19.11.2025 11:40
- Researchers Observe Sub-One-Hour Ransomware Attacks — www.infosecurity-magazine.com — 02.04.2026 16:00
-
28.08.2025 21:49 9 articles · 7mo ago
Akira and Cl0p Lead Ransomware Attacks in 2025
Security researchers at Halcyon reported that Akira ransomware has demonstrated the capability to complete an entire attack lifecycle in less than four hours, with some incidents occurring in under one hour without detection. This represents a critical advancement in ransomware velocity, attributed to Akira’s stealthy tactics, rapid compromise capabilities, and disciplined operational tempo. Akira leverages vulnerabilities in VPN appliances and backup solutions—particularly SonicWall, Veeam, and Cisco devices lacking multi-factor authentication (MFA)—as well as credential theft, spearphishing, and initial access brokers (IABs) for initial access. Akira employs double-extortion tactics, exfiltrating data prior to encryption while evading detection through disabling security software and using living-off-the-land tools. The group’s rapid compromise capabilities, disciplined operational tempo, and hybrid encryption schemes enable maximum impact in minimal time. Akira has also expanded its targeting to Nutanix AHV virtual machines, further diversifying its attack surface.
Show sources
- Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups — www.darkreading.com — 28.08.2025 21:49
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
- Half of Ransomware Access Due to Hijacked VPN Credentials — www.infosecurity-magazine.com — 19.11.2025 11:40
- Researchers Observe Sub-One-Hour Ransomware Attacks — www.infosecurity-magazine.com — 02.04.2026 16:00
Information Snippets
-
Ransomware attacks increased by 179% from January to June 2025 compared to the same period in 2024.
First reported: 28.08.2025 21:495 sources, 6 articlesShow sources
- Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups — www.darkreading.com — 28.08.2025 21:49
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- Researchers Observe Sub-One-Hour Ransomware Attacks — www.infosecurity-magazine.com — 02.04.2026 16:00
-
Akira and Cl0p are the most active RaaS groups in the first half of 2025.
First reported: 28.08.2025 21:494 sources, 5 articlesShow sources
- Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups — www.darkreading.com — 28.08.2025 21:49
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
The manufacturing and technology industries are primary targets, with the US being the most affected country.
First reported: 28.08.2025 21:494 sources, 5 articlesShow sources
- Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups — www.darkreading.com — 28.08.2025 21:49
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
The RaaS model allows lower-skilled actors to launch attacks, contributing to the surge in ransomware incidents.
First reported: 28.08.2025 21:493 sources, 4 articlesShow sources
- Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups — www.darkreading.com — 28.08.2025 21:49
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
New tactics include pure extortion without encryption and AI-assisted phishing.
First reported: 28.08.2025 21:495 sources, 6 articlesShow sources
- Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups — www.darkreading.com — 28.08.2025 21:49
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- Researchers Observe Sub-One-Hour Ransomware Attacks — www.infosecurity-magazine.com — 02.04.2026 16:00
-
Ransomware groups may use leaked source code from defunct groups, such as Safepay sharing code with LockBit and Conti.
First reported: 28.08.2025 21:491 source, 1 articleShow sources
- Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups — www.darkreading.com — 28.08.2025 21:49
-
Akira ransomware group has targeted SonicWall devices for initial access, exploiting a year-old security flaw (CVE-2024-40766).
First reported: 11.09.2025 13:335 sources, 7 articlesShow sources
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
- Half of Ransomware Access Due to Hijacked VPN Credentials — www.infosecurity-magazine.com — 19.11.2025 11:40
-
SonicWall appliances have been subject to increased threat activity, including brute-force attacks on user credentials.
First reported: 11.09.2025 13:334 sources, 4 articlesShow sources
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
Akira ransomware group has exploited misconfigurations in SonicWall SSL VPN settings, allowing unauthorized access.
First reported: 11.09.2025 13:334 sources, 4 articlesShow sources
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
The Australian Cyber Security Centre (ACSC) has acknowledged Akira's targeting of vulnerable Australian organizations through SonicWall devices.
First reported: 11.09.2025 13:334 sources, 4 articlesShow sources
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
Akira ransomware has been active since March 2023, claiming 967 victims to date.
First reported: 11.09.2025 13:334 sources, 4 articlesShow sources
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- Researchers Observe Sub-One-Hour Ransomware Attacks — www.infosecurity-magazine.com — 02.04.2026 16:00
-
Akira conducted 40 attacks in July 2025, making it the third most active group after Qilin and INC Ransom.
First reported: 11.09.2025 13:333 sources, 3 articlesShow sources
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
Akira has targeted manufacturing and transportation sectors through sophisticated phishing and multi-platform ransomware deployments.
First reported: 11.09.2025 13:333 sources, 3 articlesShow sources
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
Akira ransomware infections have leveraged SEO poisoning techniques to deliver trojanized installers for IT management tools.
First reported: 11.09.2025 13:333 sources, 3 articlesShow sources
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
AdaptixC2 post-exploitation framework has been used in Akira ransomware attacks for command execution, file transfer, and data exfiltration.
First reported: 11.09.2025 13:333 sources, 3 articlesShow sources
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
Akira ransomware group follows a standard attack flow: initial access via SSLVPN, privilege escalation, data theft, backup deletion, and hypervisor-level encryption.
First reported: 11.09.2025 13:334 sources, 4 articlesShow sources
- SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers — thehackernews.com — 11.09.2025 13:33
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
Akira ransomware group has been exploiting CVE-2024-40766, a critical-severity access control vulnerability in SonicWall devices, to gain unauthorized access.
First reported: 11.09.2025 19:323 sources, 3 articlesShow sources
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
SonicWall released a patch for CVE-2024-40766 in August 2024, but incomplete remediation has led to renewed exploitation.
First reported: 11.09.2025 19:324 sources, 5 articlesShow sources
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
The Australian Cyber Security Centre (ACSC) issued an alert about the increased exploitation of CVE-2024-40766 by Akira ransomware.
First reported: 11.09.2025 19:323 sources, 3 articlesShow sources
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
Rapid7 reported that Akira ransomware attacks on SonicWall devices have re-ignited due to incomplete remediation.
First reported: 11.09.2025 19:324 sources, 4 articlesShow sources
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
SonicWall has high confidence that the recent SSLVPN activity is not connected to a zero-day vulnerability but is related to CVE-2024-40766.
First reported: 11.09.2025 19:324 sources, 4 articlesShow sources
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
SonicWall investigated up to 40 security incidents related to the exploitation of CVE-2024-40766.
First reported: 11.09.2025 19:324 sources, 4 articlesShow sources
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
Akira ransomware exploits broad access permissions of the Default Users Group and default public access permissions for the Virtual Office Portal on SonicWall devices.
First reported: 11.09.2025 19:323 sources, 3 articlesShow sources
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
SonicWall recommends updating to firmware version 7.3.0 or later, rotating account passwords, enforcing multi-factor authentication (MFA), and mitigating SSLVPN Default Groups risk.
First reported: 11.09.2025 19:322 sources, 2 articlesShow sources
- Akira ransomware exploiting critical SonicWall SSLVPN bug again — www.bleepingcomputer.com — 11.09.2025 19:32
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
-
Akira ransomware operators are targeting SSL VPN accounts that use a one-time password (OTP) as the multi-factor authentication (MFA) option.
First reported: 29.09.2025 12:324 sources, 4 articlesShow sources
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Half of Ransomware Access Due to Hijacked VPN Credentials — www.infosecurity-magazine.com — 19.11.2025 11:40
-
Arctic Wolf observed dozens of incidents tied to VPN client logins from VPS hosting providers, network scanning, Impacket SMB activity, and Active Directory discovery.
First reported: 29.09.2025 12:324 sources, 4 articlesShow sources
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
Akira's dwell times are measured in hours, among the shortest recorded for ransomware.
First reported: 29.09.2025 12:323 sources, 3 articlesShow sources
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
Akira affiliates leveraged pre-installed and legitimate utilities to evade detection.
First reported: 29.09.2025 12:323 sources, 3 articlesShow sources
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
Akira used the Datto remote monitoring and management (RMM) tool on a domain controller to execute a PowerShell script and gain full control over the server.
First reported: 29.09.2025 12:324 sources, 4 articlesShow sources
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
Akira modified registries to evade detection, turned off security features, and dropped various files, including scripts that modified firewall rules.
First reported: 29.09.2025 12:324 sources, 4 articlesShow sources
- Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues — www.securityweek.com — 29.09.2025 12:32
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
The earliest activity connected to the Akira ransomware campaign began in mid-July 2025, with similar malicious VPN logins tracked back to October 2024.
First reported: 29.09.2025 23:531 source, 1 articleShow sources
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
The campaign remains active, with attacks consistent since July 2025, showing a slight decrease around the end of August and early September, and picking up pace again around the end of September 2025.
First reported: 29.09.2025 23:531 source, 1 articleShow sources
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
A range of SonicWall devices, including NSA and TZ series devices running versions of SonicOS 6 and 7, have been targeted.
First reported: 29.09.2025 23:531 source, 1 articleShow sources
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
SonicOS firmware versions 6.5.5.1-6n, 7.0.1-5065, 7.0.1-5119, 7.1.2-7019, 7.1.3-7015, and 7.3.0-7012 are vulnerable, as well as hardware models NSa 2600, NSa 2700, NSa 4650, NSa 5700, TZ370, and TZ470.
First reported: 29.09.2025 23:531 source, 1 articleShow sources
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
The campaign may trace back to earlier exploitation of CVE-2024-40766, impacting SonicOS 5, 6, and 7, with credentials stolen from vulnerable firewalls possibly carried forward to newer SonicOS versions.
First reported: 29.09.2025 23:531 source, 1 articleShow sources
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
Arctic Wolf Labs observed intrusions affecting devices running SonicOS 7.3.0 and even more recent versions, such as 8.0.2.
First reported: 29.09.2025 23:531 source, 1 articleShow sources
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
-
Arctic Wolf Labs recommends monitoring for VPN logins from untrusted hosting infrastructure, maintaining visibility into internal networks, and monitoring for anomalous SMB activity indicative of Impacket use.
First reported: 29.09.2025 23:532 sources, 2 articlesShow sources
- Akira Hits SonicWall VPNs in Broad Ransomware Campaign — www.darkreading.com — 29.09.2025 23:53
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
-
Akira ransomware has expanded its encryption capabilities to target Nutanix AHV virtual machines, encrypting .qcow2 disk files.
First reported: 14.11.2025 00:322 sources, 2 articlesShow sources
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
Akira threat actors have been observed using utilities such as nltest, AnyDesk, LogMeIn, Impacket's wmiexec.py, and VB scripts for reconnaissance, lateral movement, and persistence.
First reported: 14.11.2025 00:322 sources, 2 articlesShow sources
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
Akira has exfiltrated data in as little as two hours during some attacks.
First reported: 14.11.2025 00:322 sources, 2 articlesShow sources
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
Akira has used tunneling tools such as Ngrok to establish encrypted command-and-control channels.
First reported: 14.11.2025 00:322 sources, 2 articlesShow sources
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
Akira has exploited CVE-2023-27532 and CVE-2024-40711 vulnerabilities on unpatched Veeam Backup & Replication servers to gain access and delete backups.
First reported: 14.11.2025 00:322 sources, 2 articlesShow sources
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
Akira has been observed copying VMDK files from domain controller VMs to extract NTDS.dit files and SYSTEM hives for domain administrator access.
First reported: 14.11.2025 00:322 sources, 2 articlesShow sources
- CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs — www.bleepingcomputer.com — 14.11.2025 00:32
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
Akira ransomware has claimed approximately $244.17m in ransomware proceeds since late September 2025.
First reported: 14.11.2025 13:131 source, 2 articlesShow sources
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
- Researchers Observe Sub-One-Hour Ransomware Attacks — www.infosecurity-magazine.com — 02.04.2026 16:00
-
Akira threat actors have been observed exfiltrating data in just over two hours from initial access in some incidents.
First reported: 14.11.2025 13:131 source, 2 articlesShow sources
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
- Researchers Observe Sub-One-Hour Ransomware Attacks — www.infosecurity-magazine.com — 02.04.2026 16:00
-
Akira ransomware operators have demonstrated a significant evolution in their tactics by encrypting Nutanix AHV virtual machine disk files for the first time in June 2025.
First reported: 14.11.2025 13:131 source, 2 articlesShow sources
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
- Researchers Observe Sub-One-Hour Ransomware Attacks — www.infosecurity-magazine.com — 02.04.2026 16:00
-
Akira threat actors gain access to VPN products, such as SonicWall, by stealing login credentials, exploiting vulnerabilities, using initial access brokers (IABs), brute-forcing VPN endpoints, and password spraying techniques.
First reported: 14.11.2025 13:131 source, 3 articlesShow sources
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
- Half of Ransomware Access Due to Hijacked VPN Credentials — www.infosecurity-magazine.com — 19.11.2025 11:40
- Researchers Observe Sub-One-Hour Ransomware Attacks — www.infosecurity-magazine.com — 02.04.2026 16:00
-
Akira threat actors have been observed gaining initial access through the Secure Shell (SSH) protocol by exploiting a router’s IP address.
First reported: 14.11.2025 13:131 source, 1 articleShow sources
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
Akira threat actors leverage Impacket to execute the remote command wmiexec.py.
First reported: 14.11.2025 13:131 source, 2 articlesShow sources
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
- Half of Ransomware Access Due to Hijacked VPN Credentials — www.infosecurity-magazine.com — 19.11.2025 11:40
-
Akira threat actors implement techniques such as uninstalling endpoint detection and response (EDR) systems to evade detection.
First reported: 14.11.2025 13:131 source, 2 articlesShow sources
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
- Half of Ransomware Access Due to Hijacked VPN Credentials — www.infosecurity-magazine.com — 19.11.2025 11:40
-
Akira threat actors create new user accounts and add them to the administrator group to establish a foothold in the environment.
First reported: 14.11.2025 13:131 source, 1 articleShow sources
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
Akira ransomware operators use tunneling tools like Ngrok to establish encrypted command-and-control (C2) channels that evade perimeter monitoring.
First reported: 14.11.2025 13:131 source, 2 articlesShow sources
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
- Researchers Observe Sub-One-Hour Ransomware Attacks — www.infosecurity-magazine.com — 02.04.2026 16:00
-
Akira ransomware operators leverage PowerShell and WMIC to disable services and run malicious scripts, enabling deeper system compromise.
First reported: 14.11.2025 13:131 source, 2 articlesShow sources
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
- Researchers Observe Sub-One-Hour Ransomware Attacks — www.infosecurity-magazine.com — 02.04.2026 16:00
-
Akira ransomware operators use sophisticated hybrid encryption schemes to lock data, appending encrypted files with extensions such as .akira, .powerranges, .akiranew, or .aki.
First reported: 14.11.2025 13:131 source, 1 articleShow sources
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
-
A ransom note named fn.txt or akira_readme.txt appears in both the root directory (C:) and each user’s home directory (C:\Users).
First reported: 14.11.2025 13:131 source, 2 articlesShow sources
- Akira Ransomware Haul Surpasses $244M in Illicit Proceeds — www.infosecurity-magazine.com — 14.11.2025 13:13
- Researchers Observe Sub-One-Hour Ransomware Attacks — www.infosecurity-magazine.com — 02.04.2026 16:00
-
Akira, Qilin, and INC Ransomware were the most prolific groups in Q3 2025, accounting for 65% of cases.
First reported: 19.11.2025 11:401 source, 1 articleShow sources
- Half of Ransomware Access Due to Hijacked VPN Credentials — www.infosecurity-magazine.com — 19.11.2025 11:40
-
The use of valid credentials to access VPNs was the most common method of initial access, accounting for 48% of breaches in Q3 2025.
First reported: 19.11.2025 11:401 source, 1 articleShow sources
- Half of Ransomware Access Due to Hijacked VPN Credentials — www.infosecurity-magazine.com — 19.11.2025 11:40
-
Akira consistently gained access by using valid credentials in credential stuffing attacks against SonicWall SSLVPN services, exploiting weak access controls such as absent MFA and insufficient lockout policies on the device.
First reported: 19.11.2025 11:401 source, 1 articleShow sources
- Half of Ransomware Access Due to Hijacked VPN Credentials — www.infosecurity-magazine.com — 19.11.2025 11:40
-
Beazley tracked 11,775 new CVEs published by NIST in Q3 2025, with 38% more advisories issued regarding zero-day vulnerabilities.
First reported: 19.11.2025 11:401 source, 1 articleShow sources
- Half of Ransomware Access Due to Hijacked VPN Credentials — www.infosecurity-magazine.com — 19.11.2025 11:40
-
Security researchers at Halcyon reported that Akira ransomware has demonstrated the capability to complete an entire attack lifecycle in less than four hours, with some incidents occurring in under one hour without prior detection.
First reported: 02.04.2026 16:001 source, 1 articleShow sources
- Researchers Observe Sub-One-Hour Ransomware Attacks — www.infosecurity-magazine.com — 02.04.2026 16:00
Similar Happenings
Lazarus Group Linked to Medusa Ransomware Attacks on U.S. Healthcare
North Korean state-backed hackers from the Lazarus group are targeting U.S. healthcare organizations and entities in the Middle East with Medusa ransomware in financially motivated extortion attacks. The Medusa ransomware-as-a-service (RaaS) operation has impacted over 366 organizations since its launch in 2023, with at least four additional healthcare and non-profit organizations in the U.S. targeted since November 2025. This is the first time Lazarus has been linked to Medusa ransomware, though they have been associated with other ransomware strains. The attacks use a toolset that includes both custom and commodity tools, some of which are linked to another North Korean group, Diamond Sleet. The average ransom recorded in these attacks is $260,000, which is reportedly used to fund espionage operations against defense, technology, and government sectors in the U.S., Taiwan, and South Korea. Symantec has provided indicators of compromise (IoCs) to help defenders prevent these attacks. The Stonefly sub-group of Lazarus, also known as Andariel, has been involved in ransomware operations for the past five years. Rim Jong Hyok, an alleged Stonefly member, was indicted by the US Justice Department for ransomware campaigns targeting US hospitals and healthcare providers. The US Justice Department announced a $10m reward for information related to Rim Jong Hyok.
AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks
A Russian-speaking, financially motivated hacker used generative AI services to breach over 600 FortiGate firewalls across 55 countries in five weeks. The campaign, which occurred between January 11 and February 18, 2026, targeted exposed management interfaces and weak credentials lacking MFA protection. The attacker used AI to automate access to other devices on breached networks, extracting sensitive configuration data and conducting reconnaissance. The attacker successfully compromised multiple organizations' Active Directory environments, extracted complete credential databases, and targeted backup infrastructure, likely in a lead-up to ransomware deployment. The threat actor used the CyberStrikeAI AI-powered security testing platform, which integrates over 100 security tools and allows for end-to-end automation of attacks. The developer of CyberStrikeAI, known as "Ed1s0nZ," has links to Chinese government-affiliated cyber operations and has worked on additional AI-assisted security tools. Team Cymru detected 21 unique IP addresses running CyberStrikeAI between January 20 and February 26, 2026, primarily hosted in China, Singapore, and Hong Kong. Additional servers related to CyberStrikeAI have been detected in the U.S., Japan, and Switzerland. The developer has interacted with organizations supporting potentially Chinese government state-sponsored cyber operations, including Knownsec 404, a Chinese security vendor with ties to the Chinese Ministry of State Security (MSS). Ed1s0nZ has removed references to a CNNVD Level 2 Contribution Award from their GitHub profile. The campaign targeted healthcare, government, and managed service providers. The attackers exploited vulnerabilities CVE-2025-59718, CVE-2025-59719, and CVE-2026-24858. The attackers created a new local administrator account named "support" and set up four new firewall policies allowing unrestricted access. The attackers periodically checked device accessibility, consistent with initial access broker (IAB) behavior. The attackers extracted configuration files containing encrypted service account LDAP credentials. The attackers authenticated to the AD using clear text credentials from the fortidcagent service account. The attackers enrolled rogue workstations in the AD, allowing deeper access. The attackers deployed remote access tools like Pulseway and MeshAgent. The attackers downloaded malware from a cloud storage bucket via PowerShell from AWS infrastructure. The Java malware was used to exfiltrate the contents of the NTDS.dit file and SYSTEM registry hive to an external server (172.67.196[.]232) over port 443.
Ransomware Attack on Advantest Corporation
Advantest Corporation, a major supplier of automatic test equipment for the semiconductor industry, detected a ransomware attack on February 15, 2026. The company confirmed an IT network intrusion and activated incident response protocols. Preliminary findings suggest unauthorized access and ransomware deployment, but the extent of data exfiltration remains unclear. No ransomware group has claimed responsibility yet. Advantest employs over 7,500 people, has an annual revenue of more than $5 billion, and a market capitalization of $120 billion. The company serves key chipmakers like Intel, Samsung, and TSMC. The attack follows recent ransomware incidents in the semiconductor sector and new Japanese government OT security guidelines for semiconductor factories.
Increase in Ransomware Victims Despite Decline in Active Groups
Ransomware attacks surged in Q4 2025, with a 50% increase in victim organizations compared to the previous quarter and a 40% rise year-over-year. Despite a decline in the number of active ransomware groups, top-tier operators like Qilin, Akira, and Sinobi intensified their activities, focusing on rapid execution to avoid detection. Qilin led with over 450 victims, including Asahi, while Sinobi saw a 300% surge in data-leak site listings, emerging as a significant threat.
Bizarre Bazaar Campaign Exploits Exposed LLM Endpoints
A cybercrime operation named 'Bizarre Bazaar' is actively targeting exposed or poorly authenticated LLM (Large Language Model) service endpoints. Over 35,000 attack sessions were recorded in 40 days, involving unauthorized access to steal computing resources, resell API access, exfiltrate data, and pivot into internal systems. The campaign highlights the emerging threat of 'LLMjacking' attacks, where attackers exploit misconfigurations in LLM infrastructure to monetize access through cryptocurrency mining and darknet markets. The SilverInc service, marketed on Telegram and Discord, resells access to more than 50 AI models in exchange for cryptocurrency or PayPal payments. A recent investigation by SentinelOne SentinelLABS and Censys revealed 175,000 unique Ollama hosts across 130 countries, many of which are configured with tool-calling capabilities, increasing the risk of LLMjacking attacks.