18 September 2025

Unmasking Akira: The Ransomware Tactics You Can’t Afford to Ignore

The ransomware group Akira has been ravaging UK businesses since at least 2023. This brief goes over what Solace Cyber have seen in the past two years. Solace Cyber have seen devastating impacts to UK businesses from the same group affecting the industries of retail, finance, manufacturing and medical organisations. Solace Cyber have encountered over 30 businesses impacted by Akira during digital forensics and incident response (DFIR) engagements.

Red Microchip Background

Background

Akira is known to have very comparable links to the old Conti cybercrime organisation, including code similarities with the ransomware payload and templated attacks that follow a playbook of procedures to carry them out. Akira focuses on being a double extortion group, with the primary goal of extorting for financial gain. Akira follows in the same footsteps, using templated, playbook-driven attacks just like Conti.

They operate a double-extortion model, first stealing data, then encrypting it, demanding payment to prevent public leaks and restore systems.

Their primary method of entry is through SSL VPN exploitation (Cisco ASA, SonicWall, WatchGuard), often taking advantage of missing MFA or unpatched vulnerabilities.

Key Observations (2023–2025)

These key observations are based on over 16 cases performed by the DFIR teams of Solace Cyber.

Attack Stage – Key Findings

Attack StageKey Findings
Initial AccessAbuse of VPNs (Cisco ASA, SonicWall, WatchGuard); exploitation of CVEs like 2023-20269 and 2024-40766.
DiscoveryTools like Netscan (31%), Advanced Port Scanner (25%), and PowerShell AD enumeration.
Privilege EscalationExploitation of Veeam vulnerabilities (CVE-2023-27532, CVE-2024-40711); credential dumping with Veeam-Get-Creds.ps1.
Lateral MovementHeavy use of RDP; SSH for ESXi/NAS systems; sometimes deploying attacker-created VMs.
Command & ControlAnyDesk (43%), OpenSSH (18.75%) most common; occasional use of Ligolo-ng, Cobalt Strike.
ExfiltrationWinSCP (31.25%), FileZilla (18.75%), Rclone (18.75%) used to steal data, sometimes in under 3 hours.
ImpactBackup destruction, ESXi/NAS encryption, and data leaks via Tor-based data leak site.

Insights from cases

Initial access

All initial access methods identified by Solace Cyber have resulted in the threat actor leveraging enterprise gateways for access to the wider estates in all cases observed.

Between 2023 to late 2024, the main method of entry seen by Solace Cyber was the abuse of Cisco ASA firewalls to gain initial access. In the majority of the cases, this was either due to the lack of MFA on accounts and exploitable firewalls vulnerable to a remote “brute force” vulnerability (CVE-2023-20269) and CVE-2020-3259, a memory disclosure vulnerability which can be used to retrieve credentials without authentication.

From late 2024 to the present day, the most common initial access method by Akira is the abuse of SonicWall SSLVPNs, primarily the same methods are used with this line of firewall product. Password-based attacks against local VPN accounts and accounts linked to Active Directory. The use of CVE-2024-40766 is a high contributing factor.

During 2025, the first cases were observed originating from the SSLVPNs of Watchguard appliances, indicating that Watchguard appliances are now on Akira’s scopes going forward.

Initial Access SSL VPN Chart

Discovery

The most common discovery utilities seen in use by Akira:

  1. Netscan seen in over 31% of cases.
  2. Advanced Port Scanner 25% of intrusions
  3. Advanced IP Scanner 12.5%
  4. Powershell discovery methods:
    • In the incidents where PowerShell use was observed for discovery, the following commands were run to collect information on all AD users, Computers, Groups, Subnets, Organisational Units, AD trusts and domain controllers.  Due to this, the following TXT files were created by the threat actor in these cases: AdSubnets.csv, AdGroups.txt, AdOUs.csv, AdComputers.txt, AdUsers.txt and AdTrusts.txt.
Code - Discovery

In less than <6% of cases, the use of the following utilities was witnessed to be utilised by Akira:

  1. Powerview – Invoke ShareFinder module
  2. Sharpshares for Share discovery.
  3. Grixba to collect information on remote systems, installed security products and software. Browsing history, processes and network information. The creation of the file ExportData.db was seen in cases where the utility was run. Initially seen to be used by the PLAY ransomware group as reported by Symantec.
  4. AD enumeration tools that can be used to find weaknesses in Active Directory were also seen in the form of Pingcastle and Sharphound with the creation of multiple JSON files such as DATE_gpos.json, DATE_users.json and the DATE_BloodHound.zip.
  5. Virtual machine enumeration was observed with the use of a utility called RvTools to enumerate VMware virtual machines' configuration, hostname and network configuration.

Privilege Escalation / Credential Access

Once inside the environment through the VPN, the threat actor may already have Active Directory (AD) credentials, depending on whether access was gained using a local firewall account or an AD account. Where valid credentials are insufficient to progress, Akira have been observed to exploit Veeam vulnerabilities such as CVE-2023-27532 and CVE-2024-40711. Indicators of this activity often include the use of xp_cmdshell following the creation of local accounts on Veeam servers, with those accounts then added to the Local Administrators and RDP Users groups. A common next step is execution of the script “Veeam-Get-Creds.ps1” (or a variant), which extracts all stored credentials from the Veeam SQL database in plain text. This activity may also be performed by the threat actor using VeeamHax.exe. The credentials within Veeam frequently include ESXi, Hyper-V, backup repository credentials for NAS devices, as well as domain administrator credentials, providing a powerful escalation path. In some cases, this credential dumping from Veeam occurs later in the incident, after initial data exfiltration, once attackers have established sufficient access.

Where Veeam exploitation is not possible, such as when instances are patched or absent, attackers have also turned to password-based attacks. This often takes the form of password spraying, which can be identified early in incidents by a spike in failed logins and multiple account lockouts.

Akira ransomware operators are sometimes observed using advanced credential theft techniques, but these activities are relatively infrequent compared to their other behaviours. In a minority of cases, they have stolen the NTDS.dit file (Active Directory’s database of user accounts and password hashes) along with the System hive, which allows them to decrypt and crack those hashes offline. Tools like Mimikatz have been seen in more than 12.5% of cases, enabling attackers to dump credentials from memory or conduct a DCSync attack to replicate password data directly from a domain controller. A technique to impersonate a domain controller and replicate password data from Active Directory.

They have also been observed performing Kerberoasting attacks, often when connected over an SSL VPN, to target service accounts by extracting and attempting to crack their Kerberos tickets. While powerful, these tactics are not consistently used in every incident; rather, they show up only in select cases. When they do occur, they provide attackers with a path to escalate privileges, spread across the network, and facilitate widespread ransomware deployment.

Open Padlock Cyber Security

Persistence and C2 (Command and Control)

Akira are well known at Solace Cyber to use methods of command and control, with the most common method being the use of the RMM tool AnyDesk, which was seen in more than 43% of Akira incident response cases. The second method is the use of OpenSSH for remote access, which was seen in at least 18.75% of cases.

In the minority <6% of cases the following tools were utilised:

1. The use of Chrome Remote Desktop was observed, where the following PowerShell Command was run to configure remote access.

Code - Chrome Remote Desktop

2. Akira has been seen to use reverse shells on ESXi hosts for remote access.

Code - Reverse shells on ESXi hosts

3. In at least two cases, the protocol tunnelling utility called “Ligolo-ng” was utilised by executing a base-64 encoded command. The tool allows the threat actor group to access the network just like if they were connected over the VPN, allowing their machines access to the organisation's network directly, as well as potential protocol tunnelling of FTP traffic to the threat actor's tunnelled server.

4. In a small number of cases, the threat actor was observed to use CobaltStrike beacons to remain in the environment.

Where C2 methods were absent, the window of the incident is usually short; thus, in these cases, it is probable that the threat actor didn’t deem it necessary to deploy methods of remote access into the environment and remained connected via the SSL VPN. Alternatively, the forensics was damaged by encryption upon all retrieval.

Blue Digital Background

Lateral Movement / Execution

The most common method abused for lateral movement was Remote Desktop Protocol (RDP), where Solace Cyber observed its use in all cases from the SSL VPN range to Windows hosts. As the saying goes, it is the ransomware deployment protocol after all.

In the majority of cases where ESXi hosts are present or NAS devices, the threat actor is seen to use SSH for lateral movement.

Pass the hash techniques were observed in the majority of cases prior to the encryption stage, usually from the SSL VPN range, from systems unknown to the victim. Common examples include the hostname “kali”. A default hostname for the popular offensive security Linux distribution (https://www.kali.org/). In the minority of cases, the threat actor was observed to deploy their own virtual machine within the victim organisation in order to bypass security measures such as EDR. Where the machine was created to perform the encryption over SMB.

In the minority <6 % of cases the following tools were observed:

  1. NetExec (nxc.exe) – A post-exploitation and Active Directory enumeration tool, often used by attackers to automate credential spraying, discover network resources, and execute commands remotely across many machines.
  2. PsExec – A legitimate Microsoft Sysinternals utility that allows administrators to run processes on remote systems by creating a temporary service (PSEXESVC).
  3. Impacket AtExec.py – A Python script from the Impacket toolkit that enables remote command execution by creating scheduled tasks on target machines.
  4. MobaXterm - Was used to interact via SSH to ESXi hosts. In most cases, the SSH connection is from the SSLVPN range.

Defence Evasion

Where the threat actor is targeting the Windows operating system for later encryption, the majority have manual removal and disablement of security tooling where the threat actor has obtained sufficient administrator privileges and where no password protection measures preventing the removal of Antivirus products or EDR products were seen. The simple use of the control panel and pressing uninstall is enough in sadly a large portion. Additionally, in 48.57% of cases, Windows Defender was inhibited manually or via automated methods. In multiple cases, the PowerShell commands to disable defender protection measures were observed:

Code - Defence Evasion

In less than 6% of cases:

  1. Manual defender exclusions were found where the threat actor excluded the ransomware payload from detection by adding the exclusions of the ransomware payload and the whole C:\ drive.
  2. Where EDR / AV protection measures hindered the threat actor, the creation of virtual machines to encrypt via SMB was seen in a small number of cases that were Hyper-V environments. In these cases, the ransomware payload was executed within the newly created Virtual Machine to impact systems with EDR / AV.
  3. In cases where NAS devices were used as file systems rather than being primarily used for backups, the threat actor disabled malware protection features via the web portal on the NAS devices.

In the remaining cases where no hindrance to the threat actor was observed, defence evasion techniques were not observed and were likely considered unnecessary, as the ransomware was executed directly and exclusively on the hypervisors’ datastores containing the virtual machine disks. This limited the need for traditional evasion, with encryption occurring directly on the ESXi hosts or Hyper-V hosts.

Collection

Before exfiltration, the threat actors were observed to use compression utilities prior to exfiltration activities using the following utilities:

  • WinRAR - >62.5%
  • 7-Zip - >18.75%

Usually, these compression utilities would be run on file servers to selectively archive document types and ages.

Akira’s use of these tools usually creates identifiable artefacts which indicate which data has been compressed. For example, finance.part1.rar, finance.part2.rar, sales.part.1.rar and sales.part2.rar usually would indicate top-level folders on the file server. Recovered RAR files in cases have previously provided insight into their contents, as a single RAR part file can facilitate the identification of which folders were included in the collection within a multi-RAR set.

Blue Digital Code Background
Red Binary Code Background

Exfiltration

Usually, the length of time that Akira is within the environment is dependent on how fast businesses' upload speed is. The shortest case Solace Cyber has observed was less than three hours, and the predominant factor for speed appeared to be the gigabit upload speed of the victim.

In more than 81.25% of cases, Akira were identified to exfiltrate data using the following utilities:

  • WinSCP – > 31.25% of incidents
  • FileZilla – > 18.75% of incidents
  • Rclone - > 18.75% of incidents
  • Bitvise SSH Client - > 6%
  • Web Browser (Easyupload[.]io) - > 6%

Encryption / Impact

In all Akira cases, by incident responders at Solace Cyber, encryption was observed in 100% of all incidents.

During incidents, it has been observed that Akira targets backup devices and systems relating to backups, including QNAP devices or other generic NAS devices that were linked to backup servers. It is common to see the group perform a format/wipe the disks and perform a factory reset of these devices. Usually, the source of the credentials is either due to the Veeam password credential dumping or due to the devices being AD joined, where the account is compromised and leveraged to perform the format. In cases where NAS devices are used as a file store, the network share can be encrypted or directly encrypted with the Akira payload via SSH.

Due to Akira predominantly targeting hypervisors, it isn’t always necessary for the group to disable security products on hosts. Once on ESXi hosts with SSH enabled, there aren’t many measures that will stop Akira from running the Linux variant.

The method of encryption can vary, where scenarios can include:

  • Virtual Disk–Level Encryption (Endpoints Unaffected)
    • Core virtual machines are encrypted at the virtual disk level (VMDKs and VHDXs)
    • Endpoints (laptops/desktops) are typically left unencrypted
  • Full Environment Encryption
    • Both servers/endpoints at the OS layer (Applications and data) and virtual disks within Hyper-V or ESXi are encrypted (VMDKs and VHDXs).
  • In-Guest Encryption Only / Physical Devices
    • Virtual disks remain untouched
    • Instead, the ransomware operates within the VMs, physical servers, and endpoints, encrypting their contents (Applications and data)

The following names for the ransomware payload have been identified, usually with short names that are generic across multiple incidents. w.exe, akira.exe, lck.exe, lock.exe, locker.exe, pr.exe, n.exe, s.exe, aki.exe, win.exe, esx, winlocker.exe and hello.exe.

The ransomware payload has been seen to run directly on the hosts of one or more categories within incidents:

  • Hyper-V Disks and Hyper-V OS - >43.75%
  • Physical Servers, Laptops and Desktops running Windows OS - >43.75%
  • VMware ESXi Datastores - > 31.25%
  • NAS - > 6.25%

ESXI

Common execution commands for the ransomware payload on ESXi include the threat actor using “chmod +x” to make the file executable before running the encryptor. Then running the encryptor with multiple command line switches.

Code - ESXI

The redacted entry is the payload name.

Encryption Switches

SwitchUsage
-nPercentage of encryption
-pPath to encrypt. (VMFS volumes.)
-forkCreates a separate child process for encryption

Throughout cases, the percentage of encryption instructed can vary.

Windows

The method of execution can vary, where the threat actor predominantly runs the encryptor using PowerShell or Command Prompt as an administrator account. The execution of the Akira payload on Windows devices provides a forensic artefact where the encryptor leaves multiple log files usually within the same directory from which the encryptor was run, in the naming convention of:

“Log-DD-MM-YYYY-HH-MM-SS.txt”.

The Akira ransomware payload for Windows uses many of the same switches, where “-p” denotes the path for the encryptor to target. Here you can see the ransomware payload running from “C:\PerfLogs” targeting virtual machine disks of a Hyper-V host and the whole D and E drives. In this scenario, the threat actor left the command prompt window open, leaving the evidence on the active RDP session window.

Upon encryption, the ransomware payload appends files with “.akira” and within each folder where the encryptor has run, it dumps a TXT file called “akira_readme.txt”. This applies in both ESXi and Windows environments.

Code - Windows - PerfLogs

In the same intrusion on another Command Prompt window, the threat actor instructed the ransomware payload to encrypt endpoint devices, laptops, and desktops remotely with the command line switch “-remote” followed by the network path of the system to target.

Code - Windows - remote

In more than 6.25 % of cases, Akira have been observed to run the ransomware payload via GPOs (Group Policy Objects) to attempt to achieve a wider impact if and when new systems come online, for example, Monday morning when employees first get to the office.

Upon encryption, the ransomware payload appends the file with “.akira” and within each folder where the encryptor has run, it dumps a TXT file called “akira_readme.txt”. This applies in both ESXi and Windows environments.

Code - Windows - Akira Readme

Post Encryption

After the encryption has set its course, occasionally the victim organisation is contacted. In most cases, this is a mass email to all employees or to the senior leadership teams. Interestingly, every observed case by Solace Cyber where Akira sent emails used Gmail accounts (e.g., [email protected]).

Solace Cyber has observed this email-contact scenario in about 18.75% of intrusions. These emails usually repeat the same information found in the ransom note left on infected systems.

Occasionally, the attackers will follow up with a link to a “proof of life” package, a set of stolen sample data intended to prove they really have the victim’s files.

Code - Akira - Proof of Life

How do Akira publish the data?

Akira publish victims to an onion (tor) based website referred to as a data leak site (DLS) usually included in the ransomware note.
Akira - Website - Home

Akira, in most cases, where the exfiltrated data is acquired, will list the organisation first within the news section of the DLS. After a varied amount of time, after the company is listed within the news section, usually 2 weeks to up to 8 weeks, but can be longer, the victim will then be listed within the leak section of the site. Some do not appear at all as a company name and are bundled with multiple organisations in a single leak post.

Instead of hosting the files directly, Akira shares magnet or torrent links.

This makes it very difficult to take down the leaked data, since torrents are hosted by many “seeders” on public trackers, making them widely and persistently available.

Akira - Website - Leaked Data Note

Mitre Attack Flow Map

AKIRA IOCs

Known Hostnames

Hostname of TA Machine – Source of Hostname

Hostname of TA MachineSource of Hostname
DESKTOP-A6MVCI0SSL VPN
DESKTOP-EEKR377SSL VPN
DESKTOP-NTOTKE1SSL VPN
DESKTOP-SBOHBN9SSL VPN
DESKTOP-UOQCGGJSSL VPN
kaliSSL VPN
WIN-0NBN6G381L0SSL VPN
WIN-2016-TESTSSL VPN
WIN-EES13C2CG49SSL VPN
WIN-F48JBFDRB2VSSL VPN

ASNs Observed

ASN – Organisation

ASNOrg
AS199959CROWNCLOUD
AS395092Shock Hosting LLC
AS62240Clouvider Limited
AS64236UnReal Servers, LLC
AS55286Server Mania Inc
AS19318Interserver Inc
AS63018Dedicated.com
AS29802HIVELOCITY, Inc
AS36352HostPapa
AS53363STARK INDUSTRIES SOLUTIONS LTD
AS30860Virtual Systems LLC
AS44477PQ HOSTING PLUS S.R.L.

File-based IOCs

ASN – Organisation

FileSHA-256
7z2409-x64.exe 
a.exe 
AdComputers.csv 
AdComputers.txt 
AdGroups.txt 
AdOUs.csv 
AdSubnets.csv 
AdTrusts.txt 
AdUsers.txt 
advanced_ip_scanner.exe 
Advanced_IP_Scanner_2.5.4594.1.exe26d5748ffe6bd95e3fee6ce184d388a1a681006dc23a0f08d53c083c593c193b
advanced_port_scanner.exe8b9c7d2554fe315199fae656448dc193accbec162d4afff3f204ce2346507a8a
Advanced_Port_Scanner_2.5.3869.exed0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb
advanced_port_scanner_console.exea1a6005cc3eb66063ae33f769fc2d335487b2ed7f92c161e49ad013ffed11ec8
aki.exe 
akira 
Akira.exe 
Anydesk.exe1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069
Anydesk.exe4a9dde3979c2343c024c6eeeddff7639be301826dd637c006074e04a1e4e9fe7
AnyDesk_5.1.1.exe 
BvSshClient-Inst.exe 
esx 
ExportData.db 
FileZilla_3.68.1_win64_sponsored2-setup.exe 
GT_NET.exe 
hello 
lck 
lock.exe 
lock_via.zip 
locker.exe 
LOG-xx-xx-xxx-xx-xx-xx.txt 
mimikatz.exe 
MobaXterm_Personal_23.1.exe9667c3a224a4ccbf6975b292a2fdeb3025babae035f58e468b9c9c800188969b
n.exe 
netscan.csv 
netscan.exe 
netscan.lic 
netscan_n.exefc5f82f45745385d8c0dc82caf2ad5695b1addfbf556d1e72d792835876574ce
OpenSSH-Win64-v8.9.1.0.msi 
Pingcastle.exe 
pr.exe 
ProcessHacker.exebd2c2cf0631d881ed382817afcce2b093f4e412ffb170a719e2762f250abfea4
PSEXESVC.exe 
rclone.conf 
rclone.exee1fefa948907a18fb0bc7717da9d4272e93bf9707413e9689ab8f053af4c7924
rclone-v1.69.0-windows-amd64.zip73f55188dbd15056b9728cb646f4e9774534b148dec3eed9ccbbaa381b95ce78
RVTools.exe 
s.exe 
shares.txt 
SharpHound.exe 
SharpShares.exe 
sshd.exe8317ff6416af8ab6eb35df3529689671a700fdb61a5e6436f4d6ea8ee002d694
svchost.exe54e3b5a2521a84741dc15810e6fed9d739eb8083cb1fe097cb98b345af24e939
svchost.exefdd00e1bf19fe207b1ca7dbee50816ff85e53eaad9deb5e5b8fef92210fb6bc0
VeeamHax.exe 
w.exe 
w.rar 
win.exe 
WinRAR.exe 
WinRAR.zipbc3088927f42f08fd5b8a22f43ba3683c310d59a0b0fe7022468d21275bc050a
winrar-x64.exe 
winrar-x64-701.exe31f7ba37180f820313b2d32e76252344598409cb932109dd84a071cd58b64aa6
WinSCP.exe 
xxxxxxxxxxxxxx_BloodHound.zip 

Recommendations for all organisations

  • Ensure Firewall / SSLVPN appliances are regularly updated to the latest patch level.
  • Make sure all accounts have MFA / 2FA on your SSL VPN.
  • Where CVE-2024-40766 has been patched on Sonicwall devices, ensure local passwords are reset.
  • Ensure lockout policies are in place on the Firewall to protect local accounts.
  • Ensure lockout policies are in place for Active Directory.
  • Ensure your firewall appliance and SSL VPN are logged to an external source
  • Ensure that no domain administrator-level accounts have SSLVPN capabilities.
  • Consider implementing a jump host to manage servers, firewalls and sensitive assets
  • Network segment server management and hypervisors
  • Ensure onsite backups are not domain joined.
  • Ensure off-site immutable backups are in place.
  • Monitor for new RMM tool use
  • Where possible, block unknown RMM tools and monitor existing RMM tool use.
  • Monitor for dual-use applications, e.g. port scanning tools and file transfer tools.
  • Ensure EDR is implemented across the whole estate to monitor for unusual PowerShell commands, discovery tooling and exfiltration tooling.
  • Ensure backup products are patched to the latest level.
  • Consider implementing monitoring for security alerts 24/7
Ransomware Recovery Support
GDPR*
Request a callback

Solace Cyber, part of Solace Global, helps companies across the UK recover from ransomware attacks and data breaches.

Risk
Offshore
Cyber
Intelligence & Reports
Case Studies

SOLACE GLOBAL CYBER LTD is registered in England & Wales no. 08830710

Incident Response Winner 2025

Solace Global

Twin Sails House,
W Quay Rd,
Poole, BH15 1JF
United Kingdom

Telephone

Please note that calls may be recorded for security and training purposes.