Tag: Akira

  • The Register: Akira ransomware crims abusing trifecta of SonicWall security holes for extortion attacks

    Source URL: https://www.theregister.com/2025/09/10/akira_ransomware_abusing_sonicwall/ Source: The Register Title: Akira ransomware crims abusing trifecta of SonicWall security holes for extortion attacks Feedly Summary: Patch, turn on MFA, and restrict access to trusted networks…or else Affiliates of the Akira ransomware gang are again exploiting a critical SonicWall vulnerability abused last summer, after a suspected zero-day flaw actually turned…

  • Hacker News: Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours

    Source URL: https://www.tomshardware.com/tech-industry/cyber-security/akira-ransomware-cracked-with-rtx-4090-new-exploit-to-brute-force-encryption-attack Source: Hacker News Title: Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours Feedly Summary: Comments AI Summary and Description: Yes Summary: The discovery of a GPU-based brute-force method to decrypt files affected by the Akira ransomware attack represents a significant breakthrough in cybersecurity. This method enables…

  • The Register: Like whitebox servers, rent-a-crew crime ‘affiliates’ have commoditized ransomware

    Source URL: https://www.theregister.com/2025/03/07/commoditization_ransomware/ Source: The Register Title: Like whitebox servers, rent-a-crew crime ‘affiliates’ have commoditized ransomware Feedly Summary: Which is why taking down chiefs and infra behind big name brand operations isn’t working Interview There’s a handful of cybercriminal gangs that Jason Baker, a ransomware negotiator with GuidePoint Security, regularly gets called in to respond…

  • The Register: Toronto Zoo ransomware crooks snatch decades of visitor data

    Source URL: https://www.theregister.com/2025/03/06/toronto_zoo_ransomware/ Source: The Register Title: Toronto Zoo ransomware crooks snatch decades of visitor data Feedly Summary: Akira really wasn’t horsing around with this one Toronto Zoo’s final update on its January 2024 cyberattack arrived this week, revealing that visitor data going back to 2000 had been compromised.… AI Summary and Description: Yes Summary:…

  • Cloud Blog: Cybercrime: A Multifaceted National Security Threat

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/cybercrime-multifaceted-national-security-threat/ Source: Cloud Blog Title: Cybercrime: A Multifaceted National Security Threat Feedly Summary: Executive Summary Cybercrime makes up a majority of the malicious activity online and occupies the majority of defenders’ resources. In 2024, Mandiant Consulting responded to almost four times more intrusions conducted by financially motivated actors than state-backed intrusions. Despite this…

  • Cisco Talos Blog: Exploring vulnerable Windows drivers

    Source URL: https://blog.talosintelligence.com/exploring-vulnerable-windows-drivers/ Source: Cisco Talos Blog Title: Exploring vulnerable Windows drivers Feedly Summary: This post is the result of research into the real-world application of the Bring Your Own Vulnerable Driver (BYOVD) technique along with Cisco Talos’ series of posts about  malicious Windows drivers. AI Summary and Description: Yes Summary: The text provides an…

  • The Register: Akira ransomware is encrypting victims again following pure extortion fling

    Source URL: https://www.theregister.com/2024/10/22/akira_encrypting_again/ Source: The Register Title: Akira ransomware is encrypting victims again following pure extortion fling Feedly Summary: Crooks revert to old ways for greater efficiency Experts believe the Akira ransomware operation is up to its old tricks again, encrypting victims’ files after a break from the typical double extortion tactics.… AI Summary and…

  • Cisco Talos Blog: Akira ransomware continues to evolve

    Source URL: https://blog.talosintelligence.com/akira-ransomware-continues-to-evolve/ Source: Cisco Talos Blog Title: Akira ransomware continues to evolve Feedly Summary: As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group’s attack chain, targeted verticals, and potential future TTPs. AI Summary and Description: Yes **Summary:** The text provides an in-depth analysis of the…