AI Draft ACTIVE

Akira

Also known as: Akira ransomware, GOLD SAHARA, PUNK SPIDER, Howling Scorpius
Affiliation Cybercriminal
Motivation Financial
Status active
Country Unknown
First Seen 2023
Last Seen 2026
Target Geographies North America, Europe, Australia

Executive Summary

Akira is a financially motivated ransomware operation and deployment entity active since at least March 2023. A joint advisory from FBI, CISA, Europol’s European Cybercrime Centre, and NCSC-NL describes Akira activity affecting organizations across North America, Europe, and Australia, with Windows and Linux or VMware ESXi variants observed in public reporting.

The operation is associated with double-extortion ransomware activity: operators obtain access, move through victim networks, exfiltrate data, and encrypt systems to pressure payment. MITRE ATT&CK tracks the group as G1024 and lists GOLD SAHARA, PUNK SPIDER, and Howling Scorpius as associated public names. Public sources support a cybercriminal attribution, but they do not identify a confirmed state sponsor or named operators.

Notable Campaigns

2023 — Emergence and Multi-Extortion Operations

SentinelOne and CISA reporting place Akira activity beginning in March 2023. Early reporting described the operation’s data leak site, ransom negotiation process, and use of Windows ransomware payloads that appended the .akira extension to encrypted files. CISA later reported that Akira activity expanded to Linux and VMware ESXi environments, including the Megazord and Akira_v2 variants.

2024 — Joint Government Advisory on Akira Tactics

The April 2024 joint advisory from FBI, CISA, Europol EC3, and NCSC-NL documented Akira indicators of compromise and tactics, techniques, and procedures observed through FBI investigations and trusted third-party reporting. The advisory described initial access through VPN services without multifactor authentication, known Cisco vulnerabilities, external remote services, phishing, and valid account abuse.

2025 — SonicWall SSL VPN Targeting

Arctic Wolf reported a 2025 surge of Akira ransomware activity involving SonicWall SSL VPN access. Its September 2025 reporting described malicious SSL VPN logins, Impacket SMB activity, short dwell times, and rapid ransomware deployment. Arctic Wolf assessed that some activity may involve credentials previously exposed through SonicWall CVE-2024-40766 rather than a single confirmed new exploit path.

Technical Capabilities

Akira operators use remote access paths, valid credentials, and known vulnerabilities to enter target networks. CISA reporting identifies VPN services, RDP, phishing, and valid account abuse as observed initial access methods. Arctic Wolf reporting highlights SonicWall SSL VPN access, suspicious logins from hosting infrastructure, SMB activity, and rapid movement from access to ransomware deployment.

Post-compromise activity includes discovery, credential access, lateral movement, data staging, exfiltration, and encryption. MITRE ATT&CK maps Akira to tools and behaviors including AdFind, LaZagne, Mimikatz, PsExec, Rclone, AnyDesk, PuTTY, PowerShell, valid account use, archive creation, cloud-service exfiltration, and volume shadow copy deletion.

Akira ransomware variants target Windows systems and VMware ESXi environments. MITRE tracks Akira ransomware as S1129 and Akira_v2 as S1194; public reporting describes C++ and Rust-based variants, including Megazord and Akira_v2. The ransomware tooling supports file encryption for financial extortion and may inhibit recovery by deleting shadow copies or stopping services.

Attribution

Public reporting supports attribution to a cybercriminal ransomware operation. CISA and MITRE describe Akira as a ransomware threat actor or deployment entity rather than a state-sponsored group. The public evidence reviewed for this profile does not identify confirmed operators, public indictments, or a specific state sponsor.

Akira overlaps with several public tracking labels. MITRE lists GOLD SAHARA, PUNK SPIDER, and Howling Scorpius as associated group names. Public reporting also discusses technical or ecosystem overlap with prior ransomware activity, but the cited sources do not prove that Akira is controlled by another named ransomware group.

MITRE ATT&CK Profile

Initial Access: Akira operators use valid accounts (T1078), external remote services (T1133), exploitation of public-facing applications, and phishing paths described in the joint government advisory.

Execution and Discovery: MITRE reports Akira use of PowerShell (T1059.001), command-line execution, file and directory discovery, network share discovery, process discovery, and system information discovery during ransomware execution and staging.

Collection and Exfiltration: MITRE maps Akira to archive creation with utilities such as WinRAR (T1560.001) and exfiltration to cloud storage using tools such as Rclone (T1567.002).

Impact: Akira ransomware encrypts victim filesystems (T1486). Public reporting also documents recovery inhibition, including deletion of volume shadow copies (T1490), and Akira_v2 behavior targeting VMware ESXi environments.

Sources & References