Skip to main content

OSINT - #StopRansomware: Akira Ransomware

Medium
Vulnerabilitymisp-galaxy:ransomware="akira"type:osintosint:lifetime="perpetual"tlp:whitetlp:clearmisp-galaxy:mitre-attack-pattern="valid accounts - t1078"misp-galaxy:mitre-attack-pattern="exploit public-facing application - t1190"misp-galaxy:mitre-attack-pattern="external remote services - t1133"misp-galaxy:mitre-attack-pattern="spearphishing attachment - t1566.001"misp-galaxy:mitre-attack-pattern="spearphishing link - t1566.002"misp-galaxy:mitre-attack-pattern="/etc/passwd and /etc/shadow - t1003.008"misp-galaxy:mitre-attack-pattern="lsass memory - t1003.001"misp-galaxy:mitre-attack-pattern="system network configuration discovery - t1016"misp-galaxy:mitre-attack-pattern="system information discovery - t1082"misp-galaxy:mitre-attack-pattern="domain trust discovery - t1482"misp-galaxy:mitre-attack-pattern="process discovery - t1057"misp-galaxy:mitre-attack-pattern="local groups - t1069.001"misp-galaxy:mitre-attack-pattern="domain groups - t1069.002"misp-galaxy:mitre-attack-pattern="remote system discovery - t1018"misp-galaxy:region="150 - europe"misp-galaxy:region="021 - northern america"misp-galaxy:mitre-attack-pattern="domain account - t1136.002"misp-galaxy:mitre-attack-pattern="disable or modify tools - t1562.001"misp-galaxy:mitre-attack-pattern="remote access software - t1219"misp-galaxy:mitre-attack-pattern="connection proxy - t1090"misp-galaxy:mitre-attack-pattern="archive via utility - t1560.001"misp-galaxy:mitre-attack-pattern="exfiltration over alternative protocol - t1048"misp-galaxy:mitre-attack-pattern="transfer data to cloud account - t1537"misp-galaxy:mitre-attack-pattern="exfiltration to cloud storage - t1567.002"misp-galaxy:mitre-attack-pattern="data encrypted for impact - t1486"misp-galaxy:mitre-attack-pattern="inhibit system recovery - t1490"
Published: Fri Apr 19 2024 (04/19/2024, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: misp-galaxy
Product: ransomware

Description

OSINT - #StopRansomware: Akira Ransomware

AI-Powered Analysis

AILast updated: 07/02/2025, 07:28:43 UTC

Technical Analysis

The Akira ransomware is a medium-severity threat identified through open-source intelligence (OSINT) and tracked by CIRCL under the #StopRansomware initiative. This ransomware employs multiple sophisticated attack techniques consistent with known ransomware behaviors, as mapped to MITRE ATT&CK patterns. Initial access vectors include spearphishing via attachments and links (T1566.001, T1566.002), exploitation of public-facing applications (T1190), and use of valid accounts (T1078). Post-compromise, Akira ransomware performs extensive reconnaissance activities such as system information discovery (T1082), network configuration discovery (T1016), domain trust discovery (T1482), process discovery (T1057), and enumeration of local and domain groups (T1069.001, T1069.002). Credential access techniques include harvesting credentials from LSASS memory (T1003.001) and from critical system files like /etc/passwd and /etc/shadow (T1003.008). The ransomware also manipulates domain accounts (T1136.002) and disables or modifies defensive tools (T1562.001) to evade detection. For lateral movement and persistence, it leverages remote access software (T1219) and connection proxies (T1090). Data exfiltration is conducted via alternative protocols (T1048) and cloud storage or cloud accounts (T1567.002, T1537). Finally, the ransomware encrypts data for impact (T1486) and inhibits system recovery mechanisms (T1490), effectively locking victims out of their data and demanding ransom. Although no known exploits are currently reported in the wild, the threat level is moderate, and the attack techniques indicate a well-rounded and potentially impactful ransomware campaign targeting both Europe and North America.

Potential Impact

For European organizations, the Akira ransomware poses a significant risk to confidentiality, integrity, and availability of critical data and systems. The ransomware's ability to exploit public-facing applications and use spearphishing campaigns increases the likelihood of initial compromise. Once inside, the extensive reconnaissance and credential harvesting capabilities can lead to widespread lateral movement and domain compromise, severely impacting enterprise networks. The encryption of data combined with inhibition of recovery mechanisms can cause prolonged downtime, financial losses, reputational damage, and regulatory penalties under GDPR for data breaches and unavailability. Sectors with high-value data and critical infrastructure, such as finance, healthcare, manufacturing, and government, are particularly vulnerable. The use of cloud exfiltration techniques also raises concerns about data leakage beyond organizational boundaries, potentially exposing sensitive information to threat actors. The medium severity rating suggests that while the ransomware is not currently widespread or exploited in the wild, the potential impact on European organizations is substantial if deployed effectively.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy tailored to the specific tactics used by Akira ransomware. This includes: 1) Strengthening email security with advanced phishing detection and user awareness training focused on spearphishing threats. 2) Regularly patching and hardening public-facing applications to prevent exploitation (T1190). 3) Enforcing strong credential hygiene, including multi-factor authentication (MFA) for all accounts, especially privileged and remote access accounts, to mitigate valid account abuse (T1078). 4) Deploying endpoint detection and response (EDR) solutions capable of detecting credential dumping (T1003.001, T1003.008) and unusual process or network activity. 5) Monitoring and restricting the use of remote access software and connection proxies (T1219, T1090) to authorized personnel only. 6) Implementing network segmentation and least privilege principles to limit lateral movement and domain trust exploitation (T1482). 7) Regularly backing up critical data with offline or immutable backups to enable recovery in case of encryption (T1486, T1490). 8) Monitoring for data exfiltration activities, especially to cloud storage or accounts, and enforcing strict cloud access controls. 9) Conducting regular threat hunting and incident response exercises to detect and respond to early signs of compromise. These measures, combined with continuous threat intelligence updates, will reduce the risk and impact of Akira ransomware attacks.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
2
Analysis
0
Original Timestamp
1713537157

Threat ID: 682acdbebbaf20d303f0c2c5

Added to database: 5/19/2025, 6:20:46 AM

Last enriched: 7/2/2025, 7:28:43 AM

Last updated: 7/27/2025, 3:55:25 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats