Profilo Gruppo

Dettagli e statistiche per akira

Torna alle Statistiche

Profilo Cyber Gang

akira
Profilo gang by OSINT sources

The Akira ransomware group is said to have emerged in March 2023, and there's much speculation about its ties to the former CONTI ransomware group.

It's worth noting that with the end of CONTI's operation, several affiliates migrated to independent campaigns such as Royal, BlackBasta, and others.

According to some reports, Akira affiliates also work with other ransomware operations, such as Snatch and BlackByte, as an open directory of tools used by an Akira operator was identified, which also had connections to the Snatch ransomware.

The first version of the Akira ransomware was written in C++ and appended files with the '.akira' extension, creating a ransom note named 'akira_readme.txt,' partially based on the Conti V2 source code. However, on June 29, 2023, a decryptor for this version was reportedly released by Avast.

Subsequently, a version was released that fixed the decryption flaw on July 2, 2023. Since then, the new version is said to be written in Rust, this time called 'megazord.exe,' and it changes the extension to '.powerranges' for encrypted files.

Most of Akira's initial access vectors use brute-force attempts on Cisco VPN devices (which use single-factor authentication only).
Additionally, exploitation of CVEs: CVE-2019-6693 and CVE-2022-40684 for initial access has been identified.
Source: https://github.com/crocodyli/ThreatActors-TTPs

Fonte: 0

akira

Gruppo Ransomware

Statistiche Rivendicazioni

1067
Totale
592
2025
315
2024
160
2023

URLs e Siti

Fonte Onion Ultimo Titolo Status Ultimo Scrape Versione Tor
akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion Online 13-11-2025 3
akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion / Online 13-11-2025 3

Note di Riscatto

Informazioni Crypto

Informazioni crypto non disponibili per questo gruppo.