Despite being first identified in early 2023, Akira ransomware continues to pose a significant threat to managed service providers and their clients throughout 2024 and into 2025. Akira ransomware has targeted numerous small and medium businesses and MSPs. By April 2024, more than $42 million had been extorted from victims and its prevalence has only grown since then.
The CISA advisory AA24-109A, released in April 2024, highlighted critical vulnerabilities and attack vectors that remain actively exploited by Akira operators today. Todyl continues to observe active deployments of both newer Akira variants and legacy versions that leverage the same initial access vectors outlined in the original CISA guidance, demonstrating the ransomware group's ability to target the interconnected nature of MSP environments.
CISA actions to take today to mitigate cyber threats from Akira ransomware:
In attacks Todyl has monitored, the threat actor starts by bypassing the external network perimeter and gaining machine access via RDP using compromised credentials. The threat actor then performs reconnaissance, finding other machines on the network and targeting the domain controller.
Using ping or PowerShell, the attacker seeks other hosts. With nltest.exe and net.exe on the domain controller, they enumerate domain admins, domain controllers, and all trusted domains in the Active Directory Forest.
The attacker will then proceed to try to map out the network using downloaded tools and prioritize higher-level account compromise using:
netscan.exe
masscan
Threat actors also use the system’s Notepad to copy down user and domain enumeration information in .txt files.
Before deploying ransomware, the attacker exfiltrates data through a cloud data provider. Interestingly, Todyl recently observed cases where threat actors uninstalled the EDR on every machine they moved to. Instead of using advanced techniques, they simply removed it through the EDR’s own uninstall process. Because the EDR wasn’t set up with tamper protection, this left an easy loophole for the attacker to exploit.
When analyzing these TTPs, it’s more than making judgements off a single data point. Instead, one must identify consistent behavior patterns. Todyl uncovered these patterns to detect and follow Akira’s various activities.
The ransomware group has repeatedly targeted managed service environments, with several high-profile MSP breaches documented in 2024. These attacks show a clear understanding of how to exploit MSP infrastructure to spread impact across multiple client organizations.
What to do today
Learn how you can protect what you built.
Subscribe to our newsletter to get our latest insights.