Special Features

Malware Month

Akira: Perhaps the next big thing in ransomware, says Tidal threat intelligence chief

Scott Small tells us gang's 'intent and capability' should get the attention of CSOs


Interview It might not be as big a name as BlackCat or LockBit, but the Akira ransomware is every bit as dangerous, says one cybersecurity researcher – and it's poised to make a big impact. 

Scott Small, director of cyber threat intelligence at Tidal Cyber, said that most of what Akira is doing is pretty routine for a cyber-crime gang. Regardless, Small warns not to underestimate the crew, who he said is "very much a skilled group." 

While much of what it does is exploit well-known vulnerabilities, some of Akira's tactics are less common in the ransomware world, which makes it easier to spot and remediate if you know what you're looking for. For example, Akira relies on FTP to exfiltrate files, Small said, noting FTP isn't that common a tool for ransomware groups.

"Core cyber-hygiene mitigations can have a dramatic impact on reducing your risk against these attacks," Small said in an interview you can watch above. "But it does demonstrate again the creativity and the persistence of a lot of these groups."

It's also important to know that even if you run a modest-sized organization you may not be small enough to avoid Akira. "Adversaries may go after the low hanging vulnerable fruit and ancillary organizations and use that access to pivot into those primary target environments," Small said.

In other words, almost anyone and everyone is a target these days. So get those security updates installed as soon as is practically possible, but don't stop there - watch the rest of our interview above. ®

Send us news
3 Comments

Akira ransomware is encrypting victims again following pure extortion fling

Crooks revert to old ways for greater efficiency

Senator accuses sloppy domain registrars of aiding Russian disinfo campaigns

Also, Change Healthcare sets a record, cybercrime cop suspect indicted, a new Mallox decryptor, and more

Microsoft says more ransomware stopped before reaching encryption

Volume of attacks still surging though, according to Digital Defense Report

INC ransomware rebrands to Lynx – same code, new name, still up to no good

Researchers point to evidence that scumbags visited the strategy boutique

Would banning ransomware insurance stop the scourge?

White House official makes case for ending extortion reimbursements

Ransomware's ripple effect felt across ERs as patient care suffers

389 US healthcare orgs infected this year alone

Tech firms to pay millions in SEC penalties for misleading SolarWinds disclosures

Unisys, Avaya, Check Point, and Mimecast settled with the agency without admitting or denying wrongdoing

Here's a NIS2 compliance checklist since no one cares about deadlines anymore

Only two EU members have completed the transposition into domestic law

About a quarter million Comcast subscribers had their data stolen from debt collector

Cable giant says ransomware involved, FBCS keeps schtum

Microsoft says tougher punishments needed for state-sponsored cybercriminals

Although it also reaffirmed commitment to secure-by-design initiatives

Dutch cops pwn the Redline and Meta infostealers, leak 'VIP' aliases

Legal proceedings underway with more details to follow

Penn State pays DoJ $1.25M to settle cybersecurity compliance case

Fight On, State? Not this time