Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Akira Ransomware Group Made $244 Million in Ransom Proceeds

Posted on November 14, 2025November 14, 2025 By CWS

The Akira ransomware group has remodeled $244 million in proceeds from its malicious actions, based on an up to date joint advisory from authorities businesses within the US, France, Germany, and the Netherlands.

Lively since at the very least March 2023, the hacking group is principally recognized for deploying a ransomware variant tailor-made for VMware ESXi servers, in assaults concentrating on companies and demanding infrastructure organizations in North America, Europe, and Australia.

This 12 months, nonetheless, the group expanded its toolset, and in a June 2025 assault it encrypted Nutanix Acropolis Hypervisor (AHV) VM disk information and exploited a SonicWall firewall vulnerability tracked as CVE-2024-40766.

Moreover, the ransomware gang began exploiting 5 extra vulnerabilities for preliminary entry this 12 months, together with CVE-2020-3580 (Cisco ASA and FTD), CVE-2023-28252 (Home windows), CVE-2024-37085 (VMware ESXi), and CVE-2023-27532 and CVE-2024-40711 (Veeam Backup & Replication).

Along with exploiting CVE-2024-40766, the Akira operators had been seen compromising SonicWall home equipment through stolen credentials. Preliminary entry was additionally achieved by way of entry brokers or by brute-forcing VPN endpoints.

“Moreover, Akira risk actors deploy password spraying strategies, utilizing instruments reminiscent of SharpDomainSpray to realize entry to account credentials,” the up to date joint advisory reads.

In some assaults, the hackers exploited a router’s IP tackle to realize SSH entry, tunneled command-and-control (C&C) server communication utilizing Ngrok and different instruments, after which exploited publicly disclosed Veeam vulnerabilities to compromise unpatched servers.

The Akira operators had been seen utilizing Visible Fundamental (VB) scripts, executing nltest instructions for community and area discovery, deploying distant entry instruments reminiscent of AnyDesk and LogMeIn, utilizing Impacket to execute the distant command wmiexec.py, and uninstalling EDR merchandise to evade detection.Commercial. Scroll to proceed studying.

The attackers had been noticed establishing a foothold throughout the compromised environments by creating consumer accounts and including them to the admin group, exploiting Veeam companies for privilege escalation, and shifting laterally utilizing AnyDesk, LogMeIn, RDP, SSH, and MobaXterm.

“In a reported incident, Akira risk actors bypassed Digital Machine Disk (VMDK) file safety by briefly powering down the area controller’s VM, copying the VMDK information, and attaching them to a newly created VM. This sequence of actions enabled them to extract the NTDS.dit file and the SYSTEM hive, finally compromising a extremely privileged area administrator’s account,” the advisory reads.

In some assaults, the Akira group exfiltrated information from victims’ environments inside 2 hours of preliminary entry.

The hackers then executed ransomware to encrypt the sufferer’s information (appending the .akira, .powerranges, .akiranew, .aki extensions), and deployed ransom notes within the root listing and in every consumer’s house listing.

Associated: Synnovis Confirms Affected person Data Stolen in Disruptive Ransomware Assault

Associated: Almost 30 Alleged Victims of Oracle EBS Hack Named on Cl0p Ransomware Website

Associated: CISA Updates Steering on Patching Cisco Units Focused in China-Linked Assaults

Associated: Crucial WatchGuard Firebox Vulnerability Exploited in Assaults

Security Week News Tags:Akira, Group, Million, Proceeds, Ransom, Ransomware

Post navigation

Previous Post: Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
Next Post: Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects

Related Posts

Red Teaming AI: The Build Vs Buy Debate Security Week News
Chinese Silk Typhoon Hackers Exploited Commvault Zero-Day Security Week News
High-Severity Vulnerabilities Patched in Tenable Nessus Agent Security Week News
Compyl Raises $12 Million for GRC Platform Security Week News
ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware Security Week News
European Airport Disruptions Caused by Ransomware Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT
  • Checkout.com Discloses Data Breach After Extortion Attempt

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT
  • Checkout.com Discloses Data Breach After Extortion Attempt

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News