Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Akira Ransomware Group Made 4 Million in Ransom Proceeds

Akira Ransomware Group Made $244 Million in Ransom Proceeds

Posted on November 14, 2025November 14, 2025 By CWS

The Akira ransomware group has remodeled $244 million in proceeds from its malicious actions, based on an up to date joint advisory from authorities businesses within the US, France, Germany, and the Netherlands.

Lively since at the very least March 2023, the hacking group is principally recognized for deploying a ransomware variant tailor-made for VMware ESXi servers, in assaults concentrating on companies and demanding infrastructure organizations in North America, Europe, and Australia.

This 12 months, nonetheless, the group expanded its toolset, and in a June 2025 assault it encrypted Nutanix Acropolis Hypervisor (AHV) VM disk information and exploited a SonicWall firewall vulnerability tracked as CVE-2024-40766.

Moreover, the ransomware gang began exploiting 5 extra vulnerabilities for preliminary entry this 12 months, together with CVE-2020-3580 (Cisco ASA and FTD), CVE-2023-28252 (Home windows), CVE-2024-37085 (VMware ESXi), and CVE-2023-27532 and CVE-2024-40711 (Veeam Backup & Replication).

Along with exploiting CVE-2024-40766, the Akira operators had been seen compromising SonicWall home equipment through stolen credentials. Preliminary entry was additionally achieved by way of entry brokers or by brute-forcing VPN endpoints.

“Moreover, Akira risk actors deploy password spraying strategies, utilizing instruments reminiscent of SharpDomainSpray to realize entry to account credentials,” the up to date joint advisory reads.

In some assaults, the hackers exploited a router’s IP tackle to realize SSH entry, tunneled command-and-control (C&C) server communication utilizing Ngrok and different instruments, after which exploited publicly disclosed Veeam vulnerabilities to compromise unpatched servers.

The Akira operators had been seen utilizing Visible Fundamental (VB) scripts, executing nltest instructions for community and area discovery, deploying distant entry instruments reminiscent of AnyDesk and LogMeIn, utilizing Impacket to execute the distant command wmiexec.py, and uninstalling EDR merchandise to evade detection.Commercial. Scroll to proceed studying.

The attackers had been noticed establishing a foothold throughout the compromised environments by creating consumer accounts and including them to the admin group, exploiting Veeam companies for privilege escalation, and shifting laterally utilizing AnyDesk, LogMeIn, RDP, SSH, and MobaXterm.

“In a reported incident, Akira risk actors bypassed Digital Machine Disk (VMDK) file safety by briefly powering down the area controller’s VM, copying the VMDK information, and attaching them to a newly created VM. This sequence of actions enabled them to extract the NTDS.dit file and the SYSTEM hive, finally compromising a extremely privileged area administrator’s account,” the advisory reads.

In some assaults, the Akira group exfiltrated information from victims’ environments inside 2 hours of preliminary entry.

The hackers then executed ransomware to encrypt the sufferer’s information (appending the .akira, .powerranges, .akiranew, .aki extensions), and deployed ransom notes within the root listing and in every consumer’s house listing.

Associated: Synnovis Confirms Affected person Data Stolen in Disruptive Ransomware Assault

Associated: Almost 30 Alleged Victims of Oracle EBS Hack Named on Cl0p Ransomware Website

Associated: CISA Updates Steering on Patching Cisco Units Focused in China-Linked Assaults

Associated: Crucial WatchGuard Firebox Vulnerability Exploited in Assaults

Security Week News Tags:Akira, Group, Million, Proceeds, Ransom, Ransomware

Post navigation

Previous Post: Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
Next Post: Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects

Related Posts

Microsoft Unveils Security Enhancements for Identity, Defense, Compliance Microsoft Unveils Security Enhancements for Identity, Defense, Compliance Security Week News
Google DeepMind Unveils Defense Against Indirect Prompt Injection Attacks Google DeepMind Unveils Defense Against Indirect Prompt Injection Attacks Security Week News
CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry Security Week News
BIND Updates Address High-Severity Cache Poisoning Flaws BIND Updates Address High-Severity Cache Poisoning Flaws Security Week News
Beer Giant Asahi Says Data Stolen in Ransomware Attack Beer Giant Asahi Says Data Stolen in Ransomware Attack Security Week News
ToolShell Attacks Hit 400+ SharePoint Servers, US Government Victims Named ToolShell Attacks Hit 400+ SharePoint Servers, US Government Victims Named Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News