Akira (ransomware) is a malware which emerged in March 2023.[1] It targeted over 250 entities: the government sector, businesses in Canada, US, Australia (Nissan), critical infrastructure entities (the Finnish IT services provider Tietoevry), universities (Stanford University).[2][3][4][5][6][7][3][8][9] Akira is offered as ransomware-as-a-service. [10]

References

edit
  1. ^ "#StopRansomware: Akira Ransomware | CISA". www.cisa.gov. April 18, 2024.
  2. ^ Staff, S. C. (January 22, 2024). "Akira ransomware group's changing tactics: What you need to know". SC Media.
  3. ^ a b "Akira Ransomware: Who is behind the hacker group?". May 20, 2024.
  4. ^ Paganini, Pierluigi (December 22, 2023). "Akira ransomware gang claims the theft of sensitive data from Nissan Australia". Security Affairs.
  5. ^ "Akira ransomware hits cloud service Tietoevry; numerous Swedish customers affected". therecord.media.
  6. ^ Paganini, Pierluigi (January 24, 2024). "Akira ransomware attack on Tietoevry disrupted the services of many Swedish organizations". Security Affairs.
  7. ^ Paganini, Pierluigi (April 21, 2024). "Akira ransomware received $42M in ransom payments from over 250 victims". Security Affairs.
  8. ^ "Stanford says data from 27,000 people leaked in September ransomware attack". therecord.media.
  9. ^ Sead Fadilpašić (October 14, 2024). "Veeam vulnerability exploited to deploy malware via compromised VPN credentials". TechRadar.
  10. ^ "Akira ransomware compromised at least 63 victims since March, report says". therecord.media.

See also

edit