Particle.news
Download on the App Store

U.S. and Partners Issue Updated Akira Ransomware Alert as FBI Puts Group in Top Five

The update spotlights new indicators with confirmed attacks on Nutanix AHV.

Overview

  • The joint advisory from CISA, the FBI, DoD DC3, HHS and international partners provides fresh indicators of compromise and observations current through November 2025.
  • Authorities attribute roughly $244.17 million in illicit proceeds to Akira as of late September 2025, with the FBI ranking it among its top five ransomware variants under investigation.
  • Investigators confirm Akira expanded in June 2025 to encrypt Nutanix AHV virtual machine disk files (.qcow2), extending beyond earlier focus on VMware ESXi and Hyper‑V.
  • The group exploits multiple flaws—including SonicWall CVE‑2024‑40766 and Veeam CVE‑2023‑27532/CVE‑2024‑40711—gains access via stolen or brute‑forced VPN/SSH credentials, and abuses tools such as AnyDesk, LogMeIn, Impacket and Ngrok while removing EDR and creating admin accounts.
  • The advisory notes data theft can occur in just over two hours and urges immediate mitigations including rapid patching of known exploited vulnerabilities, phishing‑resistant MFA, offline-tested backups and network segmentation.