Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Akira
ID: 5ba8e726fdce0f127e6140c04cdc26a137888
Crimeware
Ransomware
Threat types: Ransomware, RaaS, Data Leak, Extortion ecosystem
Progress: 74%
Completeness: 76%
Freshness: 70%
Operation zone: —
Aliases
Limited alias preview
| GOLD SAHARA | Howling Scorpius | PU********* | — |
Showing 2 of 3 aliases in free preview.
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: high
Akira is an active ransomware operation and associated deployer entity (since at least March 2023) using double extortion, targeting Windows and Linux/VMware ESXi environments and relying heavily on commodity post-exploitation and exfiltration tooling.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1133 | External Remote Services | TA0001 TA0003 |
|
| T1136.002 | Domain Account | TA0003 |
|
| T1003.001 | LSASS Memory | TA0006 |
|
| T1016 | System Network Configuration Discovery | TA0007 |
|
| T1018 | Remote System Discovery | TA0007 |
|
| T1219 | Remote Access Tools | TA0011 |
|
| T1090 | Proxy | TA0011 |
|
| T1560.001 | Archive via Utility | TA0009 |
|
| T1048 | Exfiltration Over Alternative Protocol | TA0010 |
|
| T1567.002 | Exfiltration to Cloud Storage | TA0010 |
|
| T1486 | Data Encrypted for Impact | TA0040 |
|
| T1490 | Inhibit System Recovery | TA0040 |
|
| T1657 | Financial Theft | TA0040 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.