FBI Uncovers Akira Ransomware Group behind Over 250 Business Breaches

On Apr 19, 2024 at 12:53 pm UTC by · 2 mins read

The group began its activities in March 2023, and has since infiltrated over 250 business entities, making away as much as $42 million in ransomware proceeds.

Akira, a less-than-a-year-old Bitcoin ransomware group, has been named as the culprit behind some recent attacks. According to an investigation by the United States Federal Bureau of Investigation (FBI), the group began its activities in March 2023, and has since infiltrated over 250 business entities, making away as much as $42 million in ransomware proceeds. Per the reports, Akira has been targeting businesses in North America, Europe, and Australia.

FBI Issues Warning against Akira Ransomware

Initially, the ransomware was targeting Windows systems. However, the FBI recently uncovered that there’s another version that also targets Linux.

To this end, the agency, with collaborative efforts from the Cybersecurity and Infrastructure Security Agency (CISA), Europol’s European Cybercrime Center (EC3) and the Netherlands’ National Cyber Security Centre (NCSC-NL), has issued a joint cybersecurity advisory (CSA). Their aim is to warn the public of the threats that this ransomware poses.

Detailing how Akira works, the advisory says it gains its first entry through pre-installed virtual private networks (VPNs) and immediately disables security software to avoid detection.

Once entry is achieved, the ransomware then begins to extract credentials and other sensitive material from the system before locking up the system. It then finishes off the attack by displaying a ransom note.

Notably, the persons behind the attack do not make any demands or give payment instructions immediately. They wait for their victims to reach out before relaying that information.

However, once the victims make contact, the bad actors ask to be paid in Bitcoin BTC for them to restore access.

Recommends Mitigation Techniques

The advisory also recommended some ways by which the general public can stay abreast of these ransomware attacks. They include implementing a recovery plan, filtering network traffic, multi-factor authentication (MFA), disabling unused ports and hyperlinks, and system-wide encryption. The statement reads:

“The FBI, CISA, EC3, and NCSC-NL recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATTACK techniques identified in this advisory.”

It might be worth noting that several security agencies, including the FBI, CISA, NCSC,  and the US National Security Agency (NSA) have also issued such warning alerts about malware in the past. They noted how malware has become commonly used by bad actors to target crypto wallets and exchanges.

Share:

Related Articles

FBI Confirms North Korean Hackers Behind Record $1.5 Billion Bybit Theft

By February 27th, 2025

FBI officially attributes February’s record-breaking $1.5 billion Bybit cryptocurrency hack to North Korean state-sponsored hackers who used sophisticated deception techniques targeting cold storage.

FBI Saves $285M From Crypto Scammers in a Year-Long Crackdown

By February 13th, 2025

Americans lost over $5 billion to cryptocurrency scams in 2023 alone, with fraudsters using sophisticated methods to create the illusion of profit while victims face devastating financial losses.

Ransomware Extortion Falls 35% in 2024 Crackdowns and Resistance Rise: Chainalysis

By February 5th, 2025

A major disruption targeting the LockBit ransomware group, combined with increased law enforcement actions, led to a significant 79% drop in ransomware payments during the second half of 2024.

Exit mobile version