Code Defence Cyber security

CISA & FBI Issue Urgent Update on “Akira” Ransomware, Citing Imminent Threat

CISA and the FBI have re-issued a joint Cybersecurity Advisory (#StopRansomware) on the “Akira” ransomware group, warning of an imminent threat to critical infrastructure. The update includes new Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IoCs) observed in recent, successful attacks.

Business Impact

This high-level alert signals that Akira is actively deploying new attack methods that are bypassing existing defenses. Organizations in education, finance, and healthcare are primary targets. An attack can lead to full operational shutdown, data exfiltration, and massive recovery costs.

Why It Happened

Akira has evolved, now heavily exploiting unpatched Cisco VPNs (without MFA) and the “Citrix Bleed” vulnerability (CVE-2023-4966) for initial access. They have also been seen using tools like “SilentButDeadly” to neutralize EDR security controls.

Recommended Executive Action

Direct your SOC and IT teams to immediately ingest the new IoCs and TTPs from this advisory into all security tools (EDR, SIEM). Mandate an immediate patch audit for all Cisco and Citrix edge devices. Enforce phishing-resistant MFA across the entire organization.

Hashtags: #Ransomware #Akira #CISA #FBI #StopRansomware #CyberAttack #CriticalInfrastructure #InfoSec

Scroll to Top

Review My Order

0

Subtotal