Akira: The Evolution of a Ransomware That Encrypts Data

Beyond Hyper-V and ESXi, Akira has also encrypted Nutanix VMs.

The bulletin that CISA dedicates to this ransomware was just updated to include this information… among other things.

The initial version dated from April 2024. A year and a half later, techniques have evolved across the board, from initial access to extortion. As for the encryption of Nutanix VMs*, it was observed in connection with a incident that occurred in June 2025. At the start of the attack chain, there appears to have been the CVE-2024-40766 flaw (faulty access control in SonicWall firewalls).

Read also: How ransomware infiltrated CH Rueil-Malmaison

Initial access via Veeam

The April 2024 version mentioned initial access via VPNs without MFA. Essentially branded Cisco, it specified, with two vulnerabilities cited. One is located in the web interface of ASA (Adaptive Security Appliance) and the other in FTD (Firepower Threat Defense). The first (CVE-2020-3259) allows retrieving content from memory without authentication. The second (CVE-2023-20269) opens the door to brute-force attacks or to establishing SSL VPN sessions with an unauthorized user.

According to the updated bulletin, to which the OFAC (Office anti-cybercrime française) contributed, the initial access arsenal diversified. Notably, with:

  • CVE-2020-3580, another vulnerability on the ASA/FTD web interface, enabling unauthenticated XSS
  • CVE-2023-28252, flaw in the CLFS (Windows logging service used by programs running in user or kernel mode), used for privilege escalation
  • CVE-2024-37085 (authentication bypass in ESXi via Active Directory)
  • CVE-2023-27532 and CVE-2024-40711, both affecting Veeam Backup & Replication (the first allows exfiltration of encrypted credentials from the config database; the second opens the door to a RCE via deserialization of malicious data)

Zemana AntiMalware hijacked to stop antivirus

During the recon phase, the bulletin update adds few elements besides the use of nltest /dclist: and nltest /DOMAIN_TRUSTS.

Among the tools used by Akira affiliates are NetScan, Advanced IP Scanner, and SoftPerfect. Mimikatz and LaZagne are also used to harvest credentials.

The initial version noted the use of a legitimate tool (Zemana AntiMalware) to terminate antivirus-related processes.

The update adds the use of remote-access tools to establish persistence and blend in with admin activity, including AnyDesk and LogMeIn.

Read also: Towards an anti-ransomware layer in the Google Drive app

Virtual disk protection neutralized

The initial bulletin offered limited detail on how Akira affiliates gained privileges.

The update provides more, including the exploitation of services like Veeam.Backup.MountService.exe and the addition of new user accounts to the admin group.
It mentions an incident in which VMDK protection was bypassed by temporarily powering off the domain controller VM. The VMDKs were then copied and attached to a new VM. This allowed the NTDS.dit file and the SYSTEM hive (the logical hive of keys, subkeys and registry values) to be extracted, ultimately compromising a domain administrator account.

A hybrid and customizable encryption

A significant number of tools were used for data exfiltration. 7-zip and WinRAR are among them, as well as FileZilla, RClone and WinSCP.

To establish command-and-control channels, AnyDesk, Cloudflare Tunnels, MobaXterm, Ngrok and RustDesk were employed.

In some cases, only about two hours elapsed between initial access and exfiltration.

The encryption scheme used by Akira was largely established by April 2024. Hybrid in nature, it combines a cipher ChaCha20 and a public-key RSA system. The combination allows full or partial encryption, while tailoring it to the type and size of files.

To complicate recovery and forensic analysis, PowerShell commands are used to delete VSS copies.

Read also: { Expert Column } – Next-generation ransomware: AI-powered extortion and the rise of data-centric attacks

Options to target only the VMs

The first version of Akira was written in C++. Its second incarnation, spotted in summer 2023, is written in Rust. It features an additional protection layer that complicates dynamic analysis, as well as thread management, improving the efficiency of the encryption process. It can also be deployed exclusively against VMs (vmonly parameter) and stop these VMs (stopvm).

Akira is associated with groups known as Gold Sahara, Howling Scorpius, Punk Spider and Storm-1567. It may have links to the now-defunct Conti.

* In a recent conference, Gartner predicted that by 2028, 35% of workloads VMware would have shifted to another platform. The firm suggested Nutanix as a primary consideration, not so much for price as for functional capabilities.

Dawn Liphardt

Dawn Liphardt

I'm Dawn Liphardt, the founder and lead writer of this publication. With a background in philosophy and a deep interest in the social impact of technology, I started this platform to explore how innovation shapes — and sometimes disrupts — the world we live in. My work focuses on critical, human-centered storytelling at the frontier of artificial intelligence and emerging tech.